0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 707.399142] Unknown ioctl 1076391951 09:59:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 707.491377] Unknown ioctl 1076391951 09:59:43 executing program 1: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 707.639696] Unknown ioctl 1076391951 [ 707.659832] Unknown ioctl 1076391951 09:59:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e", 0x1}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:43 executing program 5: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 707.799858] Unknown ioctl 1076391951 09:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:43 executing program 0: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 707.930004] Unknown ioctl 1076391951 [ 707.934051] Unknown ioctl 1076391951 09:59:43 executing program 5: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e", 0x1}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:43 executing program 0: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 708.142088] Unknown ioctl 1076391951 09:59:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:43 executing program 0: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 708.366678] Unknown ioctl 1076391951 09:59:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62ae", 0x27}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:43 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 708.388142] Unknown ioctl 1076391951 09:59:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 708.518242] Unknown ioctl 1076391951 [ 708.527986] Unknown ioctl 1076391951 09:59:44 executing program 5: mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62ae", 0x27}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 708.785304] Unknown ioctl 1076391951 09:59:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62ae", 0x27}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 708.850158] Unknown ioctl 1076391951 [ 708.858945] Unknown ioctl 1076391951 09:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:44 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 709.110172] Unknown ioctl 1076391951 [ 709.111106] Unknown ioctl 1076391951 09:59:44 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1", 0x3a}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 709.212182] Unknown ioctl 1076391951 09:59:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 709.495470] Unknown ioctl 1076391951 09:59:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 709.524148] Unknown ioctl 1076391951 09:59:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1", 0x3a}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 709.585246] Unknown ioctl 1076391951 09:59:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:45 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 709.847000] print_req_error: 4971 callbacks suppressed [ 709.847029] print_req_error: I/O error, dev loop7, sector 512 [ 709.863712] print_req_error: I/O error, dev loop7, sector 0 [ 709.869582] print_req_error: I/O error, dev loop7, sector 1 [ 709.875548] print_req_error: I/O error, dev loop7, sector 2 [ 709.881322] print_req_error: I/O error, dev loop7, sector 3 [ 709.887295] print_req_error: I/O error, dev loop7, sector 4 [ 709.893068] print_req_error: I/O error, dev loop7, sector 5 [ 709.898961] print_req_error: I/O error, dev loop7, sector 6 [ 709.904848] print_req_error: I/O error, dev loop7, sector 7 [ 709.910899] print_req_error: I/O error, dev loop7, sector 8 09:59:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 710.249576] Unknown ioctl 1076391951 09:59:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1", 0x3a}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 710.333125] Unknown ioctl 1076391951 [ 710.357704] Unknown ioctl 1076391951 09:59:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9dded", 0x4d}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 710.665527] Unknown ioctl 1076391951 09:59:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 710.715891] Unknown ioctl 1076391951 09:59:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db29517", 0x44}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 710.737996] Unknown ioctl 1076391951 09:59:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 711.128133] Unknown ioctl 1076391951 [ 711.159716] Unknown ioctl 1076391951 09:59:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 711.228271] Unknown ioctl 1076391951 09:59:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8", 0x3b}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 711.527615] Unknown ioctl 1076391951 [ 711.556198] Unknown ioctl 1076391951 09:59:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 711.591247] Unknown ioctl 1076391951 09:59:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8", 0x3b}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1", 0x3a}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 711.938950] Unknown ioctl 1076391951 [ 711.980490] Unknown ioctl 1076391951 [ 711.997635] buffer_io_error: 5391 callbacks suppressed [ 711.997657] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 712.020795] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 712.028760] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 712.036756] Buffer I/O error on dev loop7, logical block 3, lost async page write [ 712.044836] Buffer I/O error on dev loop7, logical block 4, lost async page write [ 712.052916] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 712.060923] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 712.068802] Buffer I/O error on dev loop7, logical block 7, lost async page write [ 712.077033] Buffer I/O error on dev loop7, logical block 8, lost async page write [ 712.078570] Unknown ioctl 1076391951 [ 712.084998] Buffer I/O error on dev loop7, logical block 9, lost async page write 09:59:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 712.393455] Unknown ioctl 1076391951 09:59:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 712.545641] Unknown ioctl 1076391951 [ 712.572665] Unknown ioctl 1076391951 09:59:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 712.808890] Unknown ioctl 1076391951 09:59:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 712.944097] Unknown ioctl 1076391951 [ 712.947549] Unknown ioctl 1076391951 09:59:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 713.352615] Unknown ioctl 1076391951 09:59:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 713.397616] Unknown ioctl 1076391951 09:59:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0", 0x29}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 713.674140] Unknown ioctl 1076391951 09:59:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 713.771753] Unknown ioctl 1076391951 [ 713.792504] Unknown ioctl 1076391951 09:59:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0", 0x29}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 714.137409] Unknown ioctl 1076391951 [ 714.143596] Unknown ioctl 1076391951 09:59:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0", 0x29}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 714.196511] Unknown ioctl 1076391951 09:59:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="020006", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 714.398596] Unknown ioctl 1076391951 09:59:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 714.483708] Bluetooth: hci1: command 0x0406 tx timeout [ 714.501114] Unknown ioctl 1076391951 [ 714.559844] Unknown ioctl 1076391951 09:59:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7", 0x2e}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 714.760486] Unknown ioctl 1076391951 09:59:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 714.829647] Unknown ioctl 1076391951 09:59:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7", 0x2e}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 714.852513] Unknown ioctl 1076391951 09:59:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.048226] Unknown ioctl 1076391951 09:59:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7", 0x2e}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 715.149571] print_req_error: 3477 callbacks suppressed [ 715.149582] print_req_error: I/O error, dev loop7, sector 0 [ 715.160855] print_req_error: I/O error, dev loop7, sector 1 [ 715.166702] print_req_error: I/O error, dev loop7, sector 2 [ 715.172497] print_req_error: I/O error, dev loop7, sector 3 [ 715.178353] print_req_error: I/O error, dev loop7, sector 4 [ 715.186483] print_req_error: I/O error, dev loop7, sector 5 [ 715.192299] print_req_error: I/O error, dev loop7, sector 6 [ 715.198363] print_req_error: I/O error, dev loop7, sector 7 [ 715.207505] print_req_error: I/O error, dev loop7, sector 8 [ 715.213280] print_req_error: I/O error, dev loop7, sector 9 [ 715.218712] Unknown ioctl 1076391951 09:59:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.249045] Unknown ioctl 1076391951 09:59:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 715.359206] Unknown ioctl 1076391951 09:59:50 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.503261] Unknown ioctl 1076391951 09:59:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.661516] Unknown ioctl 1076391951 09:59:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.724228] Unknown ioctl 1076391951 09:59:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 715.796370] Unknown ioctl 1076391951 09:59:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 716.021073] Unknown ioctl 1076391951 09:59:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r3 = socket(0x23, 0x805, 0x0) r4 = dup2(r3, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r4, 0x541b, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r5 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r5) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 716.328154] Unknown ioctl 1076391951 09:59:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 716.412542] Unknown ioctl 1076391951 09:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 716.697099] Unknown ioctl 1076391951 [ 716.701202] Unknown ioctl 1076391951 09:59:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb316", 0x31}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 716.970010] Unknown ioctl 1076391951 [ 717.093715] Unknown ioctl 1076391951 [ 717.098425] Unknown ioctl 1076391951 [ 717.111179] buffer_io_error: 2166 callbacks suppressed [ 717.111206] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 717.126867] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 717.134858] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 717.142993] Buffer I/O error on dev loop7, logical block 3, lost async page write [ 717.151074] Buffer I/O error on dev loop7, logical block 4, lost async page write [ 717.159068] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 717.167028] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 717.175177] Buffer I/O error on dev loop7, logical block 7, lost async page write [ 717.183205] Buffer I/O error on dev loop7, logical block 8, lost async page write 09:59:52 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb316", 0x31}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 717.191387] Buffer I/O error on dev loop7, logical block 9, lost async page write 09:59:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3", 0x30}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 717.869153] Unknown ioctl 1076391951 [ 717.906446] Unknown ioctl 1076391951 09:59:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r4 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 717.942021] Unknown ioctl 1076391951 09:59:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb316", 0x31}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 718.263469] Unknown ioctl 1076391951 [ 718.327821] Unknown ioctl 1076391951 09:59:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 718.574210] Unknown ioctl 1076391951 [ 718.596238] Unknown ioctl 1076391951 09:59:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 718.794464] Unknown ioctl 1076391951 09:59:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x0, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 718.870853] Unknown ioctl 1076391951 [ 718.995129] Unknown ioctl 1076391951 09:59:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:54 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 719.240343] Unknown ioctl 1076391951 09:59:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 719.399502] Unknown ioctl 1076391951 09:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="020003", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 719.489380] Unknown ioctl 1076391951 [ 719.490648] Unknown ioctl 1076391951 09:59:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 719.742708] Unknown ioctl 1076391951 09:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="020003", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 719.766056] Unknown ioctl 1076391951 09:59:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 719.881850] Unknown ioctl 1076391951 09:59:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="020003", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 719.990527] Unknown ioctl 1076391951 [ 719.998164] Unknown ioctl 1076391951 09:59:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 720.194835] Unknown ioctl 1076391951 09:59:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 720.247955] Unknown ioctl 1076391951 09:59:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 720.276821] print_req_error: 2555 callbacks suppressed [ 720.276845] print_req_error: I/O error, dev loop7, sector 256 [ 720.312829] print_req_error: I/O error, dev loop7, sector 0 [ 720.318893] print_req_error: I/O error, dev loop7, sector 1 09:59:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:55 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="020003", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 720.324866] print_req_error: I/O error, dev loop7, sector 2 [ 720.330650] print_req_error: I/O error, dev loop7, sector 3 [ 720.336514] print_req_error: I/O error, dev loop7, sector 4 [ 720.342287] print_req_error: I/O error, dev loop7, sector 5 [ 720.348150] print_req_error: I/O error, dev loop7, sector 6 [ 720.354006] print_req_error: I/O error, dev loop7, sector 7 [ 720.359842] print_req_error: I/O error, dev loop7, sector 8 [ 720.372771] Unknown ioctl 1076391951 [ 720.411458] Unknown ioctl 1076391951 09:59:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 720.627183] Unknown ioctl 1076391951 09:59:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 720.653821] Unknown ioctl 1076391951 09:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 720.895667] Unknown ioctl 1076391951 09:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 721.056176] Unknown ioctl 1076391951 09:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.117075] Unknown ioctl 1076391951 09:59:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:56 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.281744] Unknown ioctl 1076391951 [ 721.292568] Unknown ioctl 1076391951 09:59:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0x0) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.446120] Unknown ioctl 1076391951 [ 721.450717] Unknown ioctl 1076391951 09:59:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.510282] Unknown ioctl 1076391951 09:59:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 721.620292] Unknown ioctl 1076391951 [ 721.637494] Unknown ioctl 1076391951 09:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(0x0, 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.840168] Unknown ioctl 1076391951 [ 721.855020] Unknown ioctl 1076391951 09:59:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(0x0, 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 721.892599] Unknown ioctl 1076391951 09:59:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(0x0, 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 722.081170] Unknown ioctl 1076391951 [ 722.082652] Unknown ioctl 1076391951 09:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(0x0, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 722.225464] Unknown ioctl 1076391951 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 722.394716] Unknown ioctl 1076391951 [ 722.455039] Unknown ioctl 1076391951 [ 722.462704] buffer_io_error: 2718 callbacks suppressed [ 722.462728] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 722.477537] Buffer I/O error on dev loop7, logical block 1, lost async page write [ 722.479027] Unknown ioctl 1076391951 [ 722.485649] Buffer I/O error on dev loop7, logical block 2, lost async page write [ 722.497095] Buffer I/O error on dev loop7, logical block 3, lost async page write 09:59:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r2, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, r2) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r3 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 722.505124] Buffer I/O error on dev loop7, logical block 4, lost async page write [ 722.513118] Buffer I/O error on dev loop7, logical block 5, lost async page write [ 722.521215] Buffer I/O error on dev loop7, logical block 6, lost async page write [ 722.529262] Buffer I/O error on dev loop7, logical block 7, lost async page write [ 722.537290] Buffer I/O error on dev loop7, logical block 8, lost async page write [ 722.545304] Buffer I/O error on dev loop7, logical block 9, lost async page write 09:59:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x23, 0x805, 0x0) dup2(r5, r4) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 722.749810] Unknown ioctl 1076391951 [ 722.792224] Unknown ioctl 1076391951 09:59:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) r7 = dup2(r6, r5) ioctl$sock_TIOCINQ(r7, 0x541b, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) r8 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r8) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 09:59:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r2 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) r1 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x23, 0x805, 0x0) dup2(r5, r4) sendmsg$nl_route(r1, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) [ 722.872024] Unknown ioctl 1076391951 09:59:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r1 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r1, r1, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r1, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket(0x23, 0x805, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) r2 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, 0x0, 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) 09:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001", @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYRES32], 0x7c, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', 0x0) pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d", 0x32}, {&(0x7f0000000580)}], 0x2, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x23, 0x805, 0x0) dup2(r6, r5) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) 09:59:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', &(0x7f0000000280)='system.posix_acl_default\x00', 0x0, 0x7c, 0x3) r2 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x0) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r3, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r2, r2, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r2, 0x4c01) chdir(&(0x7f0000000040)='./control\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r2, 0x4c00, r3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) r4 = socket(0x23, 0x805, 0x0) r5 = dup2(r4, 0xffffffffffffffff) ioctl$sock_TIOCINQ(r5, 0x541b, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r6) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 723.125123] ------------[ cut here ]------------ [ 723.129574] Unknown ioctl 1076391951 [ 723.130386] generic_make_request: Trying to write to read-only block-device loop7 (partno 0) [ 723.152704] WARNING: CPU: 0 PID: 9308 at block/blk-core.c:2183 generic_make_request_checks+0x17d9/0x22e0 [ 723.162363] Kernel panic - not syncing: panic_on_warn set ... [ 723.162363] [ 723.169753] CPU: 0 PID: 9308 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 723.177560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/21/2023 [ 723.186936] Call Trace: [ 723.189550] dump_stack+0x1fc/0x2ef [ 723.193197] panic+0x26a/0x50e [ 723.196406] ? __warn_printk+0xf3/0xf3 [ 723.200447] ? generic_make_request_checks+0x17d9/0x22e0 [ 723.205920] ? __probe_kernel_read+0x130/0x1b0 [ 723.210536] ? __warn.cold+0x5/0x5a [ 723.214181] ? generic_make_request_checks+0x17d9/0x22e0 [ 723.219643] __warn.cold+0x20/0x5a [ 723.223218] ? generic_make_request_checks+0x17d9/0x22e0 [ 723.228803] report_bug+0x262/0x2b0 [ 723.232448] do_error_trap+0x1d7/0x310 [ 723.235858] Unknown ioctl 1076391951 [ 723.236344] ? math_error+0x310/0x310 [ 723.236360] ? rcu_nmi_exit+0xb3/0x180 [ 723.236376] ? retint_kernel+0x2d/0x2d [ 723.236393] ? error_entry+0x72/0xd0 [ 723.255762] ? trace_hardirqs_off_caller+0x6e/0x210 [ 723.260799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 723.265666] invalid_op+0x14/0x20 [ 723.269141] RIP: 0010:generic_make_request_checks+0x17d9/0x22e0 09:59:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./control\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa4000960) r2 = openat$vsock(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) rmdir(&(0x7f0000000100)='./control\x00') setxattr$system_posix_acl(&(0x7f0000000140)='./control\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="0200000001000000", @ANYRES32, @ANYBLOB="820007abf640c2bb4600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32, @ANYBLOB="02000600", @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=0xee00, @ANYBLOB="040006000000000008000400", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0xee00, @ANYBLOB="00000100204e9bb851cb1f560e9a72c212f3831c0c2adb72ef16579686dd1865bf601d38c4fa5ef01abbf95b8b3722c37b2919f807242eeb8e7bf06567eec32ce22141a9f1343cc31f10e67a8065264dea6bacac1bff9097023005a425fdf46f18030ace7f", @ANYRES32, @ANYBLOB="10000600000000002000040000000000"], 0x7c, 0x3) r3 = syz_open_dev$loop(&(0x7f0000000880), 0x7f, 0x182) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) removexattr(&(0x7f00000002c0)='./control\x00', &(0x7f0000000300)=@known='com.apple.system.Security\x00') pwritev(r4, &(0x7f0000000800)=[{&(0x7f00000009c0)="1e53851521405f68000049445ab542cdcc1a7bda86e079a689acae17cc31c898eda6f288fe62aee7e0f6f80ee9a7bdb3165d5a3b77c2edf9cdc1e8b94e17bbfd0db295179f6c6f363c7dc9ddedc89517dcf5e2c8508c7f49d3a05548a74b82af6ffe2403d8625c706f6e668da030a010bfe8078c0ecc9b44d0ab2bd78f1cbcd18c8135c4c6366b1345af6d45258face1d3a7ca2b4ee59d33fe", 0x99}, {&(0x7f0000000580)="79bf15435b9ab2c0592cf77636555baaa0ab09fbe168dabcaf1b8a9e012751423f44fd55a5b66c6e749ce9fd3080c6889154d02ae8050cb5733da3e5ff7d7a3538d0868d2a51a831ff5a1a04747ab0a3ee872537208a06803c08df7f3556b57ccb72f3efa09b3c5ca98b4219e6c74045c5b457e8434cbb61bff87565790caaafce8c658a684221e0cc4856332ccaf2db", 0x90}, {&(0x7f0000000640)="c0f211a97042158562cba8e3e2c7f584b9525235f69f3fb99aad665e417a3986a846daa9a8dc4c4a25dea7454258e5556e75625565ee7e56981ef30627d0e051ed6d7a96676f5cce6c48b2f66e59afe90294e5c4f8a02dfb75b899b0e38a4b60350f72dbf578eb21529abdee3fef0157797d2e435a402cc0783ab3781b3a2e5a07efaca695acf979b8794b26e23b3b587b5752db97e2a5352f709cd49ec7d503c56fe8030000008ee4cd01d92deb713202a17cac9fd512a029f2c69774bb6de518321a59961403a2f3b3440ee975701db51ec33205a1eb8b8b8d54", 0xdb}, {&(0x7f0000000740)="db0c9b8b3a69a3efecb90948a49541c349f6e58eb0e2c08bcf664ecc69a37b085704a6be41af7e13ac63a99700ccf9f7472247a077995b6927f88309738d6baec77ddc2eed2d913acf2420b1be1c51a8dd080f10fb393927490d4c967d6d07fd924d17a7c81a029ba2890b3a89602f035e64b9d7af15cba151d6edfb47d4e5e0d8aed2539294d294ab37d0ca3c61883924ec8640085183129b0d48f8629f5ff0", 0xa0}], 0x4, 0x81805, 0x0) sendfile(r3, r3, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r3, 0x4c01) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x20010, r0, 0xb8730000) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x16, 0x18, 0x6, 0x11, 0x400000a, 0xffff, 0x3, 0x142}}) socket$nl_route(0x10, 0x3, 0x0) socket(0x23, 0x805, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000440)={0x23, 0x26, 0x4, 0x1d, 0x5, 0x400, 0x1, 0x48, 0x1}) sendmsg$nl_route(r2, &(0x7f0000000840)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@ipv6_getroute={0x54, 0x1a, 0x200, 0x70bd2c, 0x25dfdbfb, {0xa, 0x14, 0x20, 0x1, 0x0, 0x4, 0xfe, 0x1, 0x1000}, [@RTA_EXPIRES={0x8, 0x17, 0x8058}, @RTA_MULTIPATH={0xc, 0x9, {0x4, 0x0, 0x1}}, @RTA_UID={0x8, 0x19, 0xffffffffffffffff}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x2}, @RTA_GATEWAY={0x14, 0x5, @remote}]}, 0x54}, 0x1, 0x0, 0x0, 0x4804}, 0x8000) ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f00000001c0)) socket$caif_seqpacket(0x25, 0x5, 0x0) memfd_create(&(0x7f0000000380)='^^]\\$\x00', 0x3) openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) [ 723.275212] Code: ca 0a 00 00 45 8b b6 1c 05 00 00 48 8d 74 24 68 48 89 ef e8 b9 14 06 00 48 c7 c7 00 29 b2 88 48 89 c6 44 89 f2 e8 4c 94 91 04 <0f> 0b 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 80 3c 02 [ 723.294205] RSP: 0018:ffff88804b47f2d0 EFLAGS: 00010282 [ 723.299578] RAX: 0000000000000000 RBX: ffff8880ae939080 RCX: 0000000000000000 [ 723.306835] RDX: 00000000000241df RSI: ffffffff814dff01 RDI: ffffed100968fe4c [ 723.314100] RBP: ffff8880a2833040 R08: 0000000000000001 R09: 0000000000000000 [ 723.321370] R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a2833070 [ 723.328630] R13: ffff8880a2833048 R14: 0000000000000000 R15: 0000000000000000 [ 723.335905] ? vprintk_func+0x81/0x180 [ 723.341393] ? retint_kernel+0x2d/0x2d [ 723.345286] ? should_fail_bio.isra.0+0xa0/0xa0 [ 723.349960] ? generic_make_request+0x409/0xdf0 [ 723.354640] ? generic_make_request+0x237/0xdf0 [ 723.359301] generic_make_request+0x23f/0xdf0 [ 723.363786] ? blk_put_request+0x110/0x110 [ 723.368031] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 723.372782] ? rcu_nmi_exit+0xb3/0x180 [ 723.376662] submit_bio+0xb1/0x430 [ 723.380217] ? generic_make_request+0xdf0/0xdf0 [ 723.384898] ? check_preemption_disabled+0x41/0x280 [ 723.389907] ? guard_bio_eod+0x2a0/0x650 [ 723.393971] submit_bh_wbc+0x5a7/0x760 [ 723.397862] __block_write_full_page+0x71a/0xf60 [ 723.402607] ? block_llseek+0xc0/0xc0 [ 723.406517] block_write_full_page+0x1f3/0x260 [ 723.411085] ? block_llseek+0xc0/0xc0 [ 723.414874] __writepage+0x5e/0xe0 [ 723.418400] write_cache_pages+0x802/0x12d0 [ 723.422722] ? tag_pages_for_writeback+0x2f0/0x2f0 [ 723.427732] ? clear_page_dirty_for_io+0xee0/0xee0 [ 723.432658] ? check_preemption_disabled+0x41/0x280 [ 723.437672] ? blkdev_readpages+0x30/0x30 [ 723.441812] generic_writepages+0xdb/0x150 [ 723.446045] ? dirty_poll_interval.part.0+0x30/0x30 [ 723.451072] ? mark_held_locks+0xf0/0xf0 [ 723.455125] ? do_vfs_ioctl+0xcdb/0x12e0 [ 723.459200] ? ksys_ioctl+0x9b/0xc0 [ 723.462817] ? __x64_sys_ioctl+0x6f/0xb0 [ 723.466864] ? do_syscall_64+0xf9/0x620 [ 723.471125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.476618] do_writepages+0xe5/0x290 [ 723.480514] ? page_writeback_cpu_online+0x10/0x10 [ 723.485486] ? do_raw_spin_unlock+0x171/0x230 [ 723.489986] ? _raw_spin_unlock+0x29/0x40 [ 723.494220] ? wbc_attach_and_unlock_inode+0x11d/0x9e0 [ 723.499490] __filemap_fdatawrite_range+0x27d/0x350 [ 723.504505] ? debug_check_no_obj_freed+0x201/0x490 [ 723.509535] ? delete_from_page_cache_batch+0xcc0/0xcc0 [ 723.515004] ? kfree+0x1e2/0x210 [ 723.518368] ? kobject_uevent_env+0x2b4/0x1480 [ 723.522956] filemap_write_and_wait+0x42/0xd0 [ 723.527452] set_blocksize+0x1cd/0x3f0 [ 723.531335] lo_ioctl+0x105a/0x20e0 [ 723.534958] ? loop_set_status64+0x110/0x110 [ 723.539367] blkdev_ioctl+0x5cb/0x1a80 [ 723.543243] ? blkpg_ioctl+0x9d0/0x9d0 [ 723.547214] ? do_futex+0x171/0x1880 [ 723.550918] ? mark_held_locks+0xf0/0xf0 [ 723.554971] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 723.559819] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 723.564411] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 723.569244] block_ioctl+0xe9/0x130 [ 723.572872] ? blkdev_fallocate+0x3f0/0x3f0 [ 723.577293] do_vfs_ioctl+0xcdb/0x12e0 [ 723.581347] ? lock_downgrade+0x720/0x720 [ 723.585490] ? ioctl_preallocate+0x200/0x200 [ 723.589898] ? __fget+0x334/0x510 [ 723.593357] ? __fget+0x356/0x510 [ 723.596807] ? do_dup2+0x450/0x450 [ 723.600343] ? __se_sys_futex+0x298/0x3b0 [ 723.604652] ksys_ioctl+0x9b/0xc0 [ 723.608202] __x64_sys_ioctl+0x6f/0xb0 [ 723.612090] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 723.616663] do_syscall_64+0xf9/0x620 [ 723.620460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.626024] RIP: 0033:0x7efdbc6810f9 [ 723.629759] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 723.648766] RSP: 002b:00007efdbabf3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 723.656473] RAX: ffffffffffffffda RBX: 00007efdbc7a0f80 RCX: 00007efdbc6810f9 [ 723.663746] RDX: 0000000000000006 RSI: 0000000000004c00 RDI: 0000000000000005 [ 723.671021] RBP: 00007efdbc6dcae9 R08: 0000000000000000 R09: 0000000000000000 [ 723.678283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 723.685552] R13: 00007fff67a2d90f R14: 00007efdbabf3300 R15: 0000000000022000 [ 723.693453] Kernel Offset: disabled [ 723.707158] Rebooting in 86400 seconds..