[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.855165] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 17.661038] random: sshd: uninitialized urandom read (32 bytes read) [ 18.046665] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.894667] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.208' (ECDSA) to the list of known hosts. [ 24.316471] random: sshd: uninitialized urandom read (32 bytes read) 2018/08/01 09:44:58 fuzzer started [ 25.777744] random: cc1: uninitialized urandom read (8 bytes read) 2018/08/01 09:45:01 dialing manager at 10.128.0.26:46293 2018/08/01 09:45:04 syscalls: 1808 2018/08/01 09:45:04 code coverage: enabled 2018/08/01 09:45:04 comparison tracing: enabled 2018/08/01 09:45:04 setuid sandbox: enabled 2018/08/01 09:45:04 namespace sandbox: enabled 2018/08/01 09:45:04 fault injection: enabled 2018/08/01 09:45:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/08/01 09:45:04 net packed injection: enabled 2018/08/01 09:45:04 net device setup: enabled [ 31.141105] random: crng init done 09:46:06 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(&(0x7f0000000000)=[{r1}, {r1}, {r2}], 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x8) 09:46:06 executing program 2: r0 = getpgid(0x0) sched_setattr(r0, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001fe8)) r2 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000019fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) close(r2) r3 = memfd_create(&(0x7f0000000100)='bdev$-\x00', 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) write$9p(r3, &(0x7f0000000080), 0x0) write$binfmt_elf32(r2, &(0x7f0000002000)=ANY=[], 0x0) close(r1) 09:46:06 executing program 7: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8001) fallocate(r0, 0x0, 0x0, 0x3fffffe) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000001100)='I', 0x1}], 0x1, 0x40000) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="1b", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0x8000) 09:46:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) 09:46:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000018ff4), 0xc, &(0x7f0000000040)={&(0x7f0000000080)={0x28, 0x28, 0x1, 0x0, 0x0, {0x1}, [@typed={0x14, 0x0, @ipv6=@dev={0xfe, 0x80, [0x0, 0x0, 0xc]}}]}, 0x28}}, 0x0) 09:46:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x10005, 0x0, 0xffffffffffffffff, 0x0, [0x18]}, 0x2c) 09:46:06 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x18, &(0x7f0000000000)={@loopback}, 0x20) 09:46:06 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="31c814eb576ecd3d6484"], 0xa) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETAW(r2, 0x5407, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f}) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x7f}) [ 92.464827] IPVS: ftp: loaded support on port[0] = 21 [ 92.465806] IPVS: ftp: loaded support on port[0] = 21 [ 92.519495] IPVS: ftp: loaded support on port[0] = 21 [ 92.522191] IPVS: ftp: loaded support on port[0] = 21 [ 92.556294] IPVS: ftp: loaded support on port[0] = 21 [ 92.570958] IPVS: ftp: loaded support on port[0] = 21 [ 92.570972] IPVS: ftp: loaded support on port[0] = 21 [ 92.589950] IPVS: ftp: loaded support on port[0] = 21 [ 94.140598] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.147024] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.172597] device bridge_slave_0 entered promiscuous mode [ 94.199506] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.205864] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.214093] device bridge_slave_0 entered promiscuous mode [ 94.236623] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.243108] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.274471] device bridge_slave_0 entered promiscuous mode [ 94.282573] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.289046] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.296630] device bridge_slave_0 entered promiscuous mode [ 94.304622] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.310978] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.326673] device bridge_slave_0 entered promiscuous mode [ 94.334183] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.340541] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.347808] device bridge_slave_0 entered promiscuous mode [ 94.356098] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.362434] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.375157] device bridge_slave_1 entered promiscuous mode [ 94.381747] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.388122] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.396059] device bridge_slave_0 entered promiscuous mode [ 94.404259] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.410623] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.421077] device bridge_slave_1 entered promiscuous mode [ 94.428127] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.434473] bridge0: port 1(bridge_slave_0) entered disabled state [ 94.444478] device bridge_slave_0 entered promiscuous mode [ 94.452931] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.459287] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.466578] device bridge_slave_1 entered promiscuous mode [ 94.473819] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.480181] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.487518] device bridge_slave_1 entered promiscuous mode [ 94.494874] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.502896] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.509398] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.528710] device bridge_slave_1 entered promiscuous mode [ 94.538052] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.545305] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.551661] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.559826] device bridge_slave_1 entered promiscuous mode [ 94.572123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.580246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.587620] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.598957] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.605316] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.633741] device bridge_slave_1 entered promiscuous mode [ 94.651157] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.657516] bridge0: port 2(bridge_slave_1) entered disabled state [ 94.665308] device bridge_slave_1 entered promiscuous mode [ 94.672858] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.681234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.689456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.696901] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.712678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.720864] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.776056] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 94.795864] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.830266] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.839494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.888911] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 94.910844] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 94.982344] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 94.999500] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.059845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.069658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.099782] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.109754] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.128184] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.138907] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.151627] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.173617] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.217845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 95.227715] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.246296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.288289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.335970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 95.580210] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.599711] team0: Port device team_slave_0 added [ 95.653071] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.677163] team0: Port device team_slave_0 added [ 95.682964] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.690917] team0: Port device team_slave_0 added [ 95.700394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.716426] team0: Port device team_slave_0 added [ 95.727505] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.736211] team0: Port device team_slave_0 added [ 95.746704] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.758548] team0: Port device team_slave_1 added [ 95.768810] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.781816] team0: Port device team_slave_0 added [ 95.788713] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.800492] team0: Port device team_slave_1 added [ 95.812730] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.826816] team0: Port device team_slave_1 added [ 95.834631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 95.847585] team0: Port device team_slave_0 added [ 95.854356] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.862415] team0: Port device team_slave_1 added [ 95.868860] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.875904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 95.884640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 95.904404] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.911733] team0: Port device team_slave_1 added [ 95.918475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.926897] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.933948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.946758] team0: Port device team_slave_1 added [ 95.958741] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 95.979700] team0: Port device team_slave_1 added [ 95.986610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 95.993622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.006538] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.021544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.029488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.036864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.044481] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.053561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.062327] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 96.069689] team0: Port device team_slave_0 added [ 96.077386] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 96.089576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 96.097765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.104807] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.115426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.140521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.158438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.165916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.173519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.180840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.188390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.196601] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 96.204025] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 96.212455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.223263] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.234779] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.242814] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 96.257563] team0: Port device team_slave_1 added [ 96.270113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.277316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.284601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.299357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.311134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.321829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.332743] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.340160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.347656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.355081] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.362678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.371634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.378494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.386549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.394553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 96.401346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 96.409267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.429313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.439745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.449354] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.458611] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.466161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.485246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.512320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.522729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.530704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 96.538154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.545748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.553405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.561126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.568954] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.576246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.584198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.593249] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.602903] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.611663] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.622119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.629557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.637820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.681713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 96.692032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.703126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.710766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.718476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.726133] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.733723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.743120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.750236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.758745] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.768372] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.784201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 96.804448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.824485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.846051] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 96.856438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 96.867549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 96.889121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 96.909664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 96.998559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 97.005804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 97.017554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 97.758541] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.764935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.771542] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.778142] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.799883] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 97.808113] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.814516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.821132] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.827495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.835218] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 97.843235] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.849583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.856180] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.862513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.870597] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 97.878351] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.884711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.891284] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.897610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.904930] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 97.911378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.919374] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.930672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.937760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 97.946891] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.953262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.959967] bridge0: port 1(bridge_slave_0) entered blocking state [ 97.966334] bridge0: port 1(bridge_slave_0) entered forwarding state [ 97.973402] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 97.984644] bridge0: port 2(bridge_slave_1) entered blocking state [ 97.990997] bridge0: port 2(bridge_slave_1) entered forwarding state [ 97.997584] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.003929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.014785] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 98.083686] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.090078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.096707] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.103065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.114849] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 98.210466] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.216848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 98.223437] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.229778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 98.236920] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 98.955174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.968404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.989336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 98.999829] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 101.710453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.843801] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.861181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.897870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.918449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.933529] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.966512] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.031750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.050084] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.236112] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.244265] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.263827] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.272249] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.312381] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.329869] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.377723] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 102.425869] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.432087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.443386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.620606] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.626778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.637903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.649680] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.655816] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.666337] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.681448] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.689577] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.699262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.726366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.736788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.750591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.759659] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.768551] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.783601] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 102.790834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.808718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.831367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.842392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.849549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 102.856470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 102.924354] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.044098] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.078362] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.113732] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.139393] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.153712] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.172819] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.187983] 8021q: adding VLAN 0 to HW filter on device team0 09:46:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000180)={0x77359400}, &(0x7f0000000200), 0x8) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0xfffffffffffffffc) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000040)=0x3) 09:46:19 executing program 6: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x40101) write$sndseq(r0, &(0x7f00000002c0), 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180), 0x8) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x80, 0x7d}) 09:46:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001d40)=[{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000001b80), 0x0, &(0x7f0000001c80)}], 0x1, 0x0) 09:46:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') mkdir(&(0x7f0000000680)='./file0//ile0\x00', 0x0) 09:46:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001d40)=[{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000001b80), 0x0, &(0x7f0000001c80)}], 0x1, 0x0) 09:46:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz1'}, 0x4) ioctl$int_in(r1, 0x800000c0045005, &(0x7f0000003ff8)=0x40000) 09:46:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001d40)=[{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000001b80), 0x0, &(0x7f0000001c80)}], 0x1, 0x0) 09:46:19 executing program 2: r0 = socket$kcm(0x2c, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x11b, 0x32, &(0x7f0000002340), 0x4) 09:46:19 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='mountstats\x00') preadv(r1, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 09:46:19 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x800455d1, &(0x7f0000000000)=""/4) 09:46:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x72, &(0x7f0000018000)={0x0, @in6}, &(0x7f0000000000)=0x8c) 09:46:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000fe9ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create(0x10007fff) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) dup3(r1, r0, 0x0) close(r2) 09:46:19 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") clone(0x0, &(0x7f00000000c0), &(0x7f0000000340), &(0x7f0000000140), &(0x7f00000001c0)) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/27) 09:46:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f0000001d40)=[{&(0x7f0000000940)=@abs, 0x6e, &(0x7f0000001b80), 0x0, &(0x7f0000001c80)}], 0x1, 0x0) 09:46:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x10, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vga_arbiter\x00', 0x20000, 0x0) mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, &(0x7f0000000000)=""/4096) 09:46:19 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x80, 0x0, 0x2}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) dup2(r0, r1) 09:46:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = memfd_create(&(0x7f00000002c0)="000080a8", 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0xa) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f00000000c0), 0x7ffff) 09:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f000082ef0a)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000140)=""/246) close(r1) close(r2) 09:46:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00000e9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000040), 0x2, 0x4) 09:46:20 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bcsf0\x00', 0x1}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 09:46:20 executing program 7: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000040)=[@release], 0x0, 0x0, &(0x7f0000000080)}) 09:46:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = memfd_create(&(0x7f00000002c0)="000080a8", 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0xa) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f00000000c0), 0x7ffff) 09:46:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = memfd_create(&(0x7f00000002c0)="000080a8", 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0xa) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f00000000c0), 0x7ffff) 09:46:20 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r2, &(0x7f00000004c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f00000000c0)={0x18, 0x0, {0x2, @random="277a4c148d89", 'bridge_slave_0\x00'}}, 0x1e) [ 106.126159] mmap: syz-executor3 (6501) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 106.138875] binder: 6498:6502 Release 1 refcount change on invalid ref 0 ret -22 [ 106.147831] binder_alloc: binder_alloc_mmap_handler: 6498 20001000-20004000 already mapped failed -16 [ 106.173294] binder: BINDER_SET_CONTEXT_MGR already set [ 106.178702] binder: 6498:6502 ioctl 40046207 0 returned -16 [ 106.196087] binder_alloc: 6498: binder_alloc_buf, no vma [ 106.201627] binder: 6498:6521 transaction failed 29189/-3, size 24-8 line 2969 [ 106.219334] binder: send failed reply for transaction 2 to 6498:6502 [ 106.233370] binder: undelivered TRANSACTION_COMPLETE [ 106.238529] binder: undelivered TRANSACTION_ERROR: 29189 [ 106.256267] binder: undelivered TRANSACTION_ERROR: 29189 09:46:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x72, &(0x7f0000018000)={0x0, @in6}, &(0x7f0000000000)=0x8c) 09:46:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) r1 = memfd_create(&(0x7f00000002c0)="000080a8", 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x5, 0xa) ftruncate(r1, 0x40001) sendfile(r0, r1, &(0x7f00000000c0), 0x7ffff) 09:46:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:20 executing program 7: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="000000000000001a00000000000000000000000000000000400015a704838e000200884000000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 09:46:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00000e9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000040), 0x2, 0x4) 09:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f000082ef0a)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000140)=""/246) close(r1) close(r2) 09:46:20 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f000082ef0a)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000140)=""/246) close(r1) close(r2) 09:46:20 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) [ 106.449139] Dev loop7: unable to read RDB block 1 [ 106.454104] loop7: unable to read partition table [ 106.502276] loop7: partition table beyond EOD, truncated [ 106.507857] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 106.565392] Dev loop7: unable to read RDB block 1 [ 106.570327] loop7: unable to read partition table [ 106.581387] loop7: partition table beyond EOD, truncated [ 106.586921] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 09:46:21 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vfat\x00') 09:46:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:21 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f000082ef0a)=""/246) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x4004743d, &(0x7f0000000140)=""/246) close(r1) close(r2) 09:46:21 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vhost-net\x00', 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, &(0x7f0000000000)) 09:46:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00000e9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000040), 0x2, 0x4) 09:46:21 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x72, &(0x7f0000018000)={0x0, @in6}, &(0x7f0000000000)=0x8c) 09:46:21 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vfat\x00') 09:46:21 executing program 7: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="000000000000001a00000000000000000000000000000000400015a704838e000200884000000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 09:46:21 executing program 6: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:21 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc80700145f8f764070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f00000e9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000040), 0x2, 0x4) 09:46:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vfat\x00') 09:46:21 executing program 7: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="000000000000001a00000000000000000000000000000000400015a704838e000200884000000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 09:46:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000000)='vfat\x00') [ 107.283662] Dev loop7: unable to read RDB block 1 [ 107.288628] loop7: unable to read partition table [ 107.303883] loop7: partition table beyond EOD, truncated [ 107.309539] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) [ 107.356141] Dev loop7: unable to read RDB block 1 [ 107.361099] loop7: unable to read partition table [ 107.366848] loop7: partition table beyond EOD, truncated [ 107.372470] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 09:46:22 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:22 executing program 7: syz_read_part_table(0x0, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="000000000000001a00000000000000000000000000000000400015a704838e000200884000000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) 09:46:22 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000080)={0x0, @dev, 0x0, 0x0, "ec6268637cd9074e2242eb7e4cff2201"}, 0x2c) 09:46:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f00000000c0)='security\\louser^:bdev)em1mime_type\'-/proc\x00', 0x13e, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 09:46:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000040)=""/63) 09:46:22 executing program 3: r0 = semget$private(0x0, 0x9, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xd) semop(r0, &(0x7f0000000000)=[{0x80000003, 0x1000000005}, {0x0, 0xfffffffffffffffd}], 0x2) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) [ 107.806746] Dev loop7: unable to read RDB block 1 [ 107.811675] loop7: unable to read partition table [ 107.822454] loop7: partition table beyond EOD, truncated [ 107.828386] loop_reread_partitions: partition scan of loop7 () failed (rc=-5) 09:46:22 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r1, &(0x7f0000000080)="0f", 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) mkdir(&(0x7f0000c92000)='./file0\x00', 0x0) r2 = creat(&(0x7f0000f66ff4)='./file0/bus\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0/bus\x00', 0x0, 0x0) writev(r2, &(0x7f00002c8000)=[{&(0x7f00007fbf5f)="b7", 0x1}], 0x1) r4 = dup(r3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x2011, r4, 0x0) sendto$inet(r1, &(0x7f0000029000)="c6", 0x1, 0x0, &(0x7f0000007ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x72, &(0x7f0000018000)={0x0, @in6}, &(0x7f0000000000)=0x8c) 09:46:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40816b}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x54}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 09:46:22 executing program 7: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sync_file_range(0xffffffffffffffff, 0x0, 0x2b7, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000070a07031dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:46:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x9}, 0x10) sendto$inet6(r0, &(0x7f0000000040)="f5", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:46:22 executing program 6: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:22 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40816b}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x54}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 09:46:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000002000010000000000000000000200007b562e1da10000000000000000"], 0x1}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 09:46:22 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:22 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40816b}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x54}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 09:46:22 executing program 3: r0 = socket$inet(0x15, 0x400000080005, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000300)=""/220, &(0x7f0000000140)=0x2) 09:46:22 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x40816b}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x54}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0x418, &(0x7f00001a7f05)=""/251}, 0x48) 09:46:23 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:23 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:23 executing program 6: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:23 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) read(r2, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0x404c534a, &(0x7f0000000480)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000013) 09:46:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:23 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$VT_RESIZE(r0, 0x800442d4, &(0x7f0000000000)) 09:46:26 executing program 7: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @loopback}]}, 0x24}}, 0x0) 09:46:26 executing program 4: r0 = memfd_create(&(0x7f0000000240)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000540)='\x00l', 0x2) sendfile(r0, r0, &(0x7f0000001000), 0x930) mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x80000000004, 0x11, r0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000100)) 09:46:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000680)="6e00742f69705f6d725f6361ff01658f") r3 = socket$inet6(0xa, 0x3, 0x3a) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000700)={0x0, 0x17, &(0x7f0000000000)="5240e437d0613ac30b25e562f868cf69da4ddab893fb18"}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000200)=0x6) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000800), &(0x7f0000000840)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000006c0)={0x0, 0x0, 0xffffffff, 0x68ca, 0x1}, 0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000340)={r7, 0x50, &(0x7f00000002c0)}, 0x10) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@empty, @empty, @mcast1, 0x200, 0x80000000081, 0x987, 0x400, 0x4, 0x1260312, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000780)=""/81) sync_file_range(r4, 0x9, 0x1fef721d, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x4, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0x0, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r9, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000740)=0x84) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000280), 0x1f4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 09:46:26 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xa) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0xb) 09:46:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$VT_RESIZE(r0, 0x800442d4, &(0x7f0000000000)) 09:46:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local, @local, {[], @tcp={{0x2c00, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)={0x0, 0x4, [0x0, 0x4d5]}) 09:46:26 executing program 6: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0xfff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 09:46:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000680)="6e00742f69705f6d725f6361ff01658f") r3 = socket$inet6(0xa, 0x3, 0x3a) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000700)={0x0, 0x17, &(0x7f0000000000)="5240e437d0613ac30b25e562f868cf69da4ddab893fb18"}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000200)=0x6) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000800), &(0x7f0000000840)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000006c0)={0x0, 0x0, 0xffffffff, 0x68ca, 0x1}, 0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000340)={r7, 0x50, &(0x7f00000002c0)}, 0x10) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@empty, @empty, @mcast1, 0x200, 0x80000000081, 0x987, 0x400, 0x4, 0x1260312, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000780)=""/81) sync_file_range(r4, 0x9, 0x1fef721d, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x4, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0x0, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r9, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000740)=0x84) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000280), 0x1f4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 09:46:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$VT_RESIZE(r0, 0x800442d4, &(0x7f0000000000)) [ 112.209306] hrtimer: interrupt took 27370 ns 09:46:26 executing program 7: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x7, &(0x7f0000000200)={0x0, @in6={{0xa, 0x0, 0x0, @local}}}, &(0x7f0000000300)=0x3) 09:46:26 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) futex(&(0x7f0000004000), 0x400000085, 0x0, &(0x7f0000001ff0), &(0x7f0000004000), 0x4020000002) 09:46:26 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") r1 = socket(0xa, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x2, 0x168, [0x200007c0, 0x0, 0x0, 0x200007f0, 0x20000820], 0x2, &(0x7f0000000040), &(0x7f00000007c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x8800}, {}, {}, {0x0, '\x00', 0x0, 0x0, 0x1, [{{{0x9, 0x0, 0x0, 'bridge_slave_1\x00', 'bond0\x00', '_\x00', 'bond_slave_1\x00', @remote, [], @random="776599ff9209", [], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@remote}}}}]}]}, 0x1e0) 09:46:26 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x4) ioctl$VT_RESIZE(r0, 0x800442d4, &(0x7f0000000000)) 09:46:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 09:46:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000680)="6e00742f69705f6d725f6361ff01658f") r3 = socket$inet6(0xa, 0x3, 0x3a) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000700)={0x0, 0x17, &(0x7f0000000000)="5240e437d0613ac30b25e562f868cf69da4ddab893fb18"}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000200)=0x6) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000800), &(0x7f0000000840)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000006c0)={0x0, 0x0, 0xffffffff, 0x68ca, 0x1}, 0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000340)={r7, 0x50, &(0x7f00000002c0)}, 0x10) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@empty, @empty, @mcast1, 0x200, 0x80000000081, 0x987, 0x400, 0x4, 0x1260312, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000780)=""/81) sync_file_range(r4, 0x9, 0x1fef721d, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x4, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0x0, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r9, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000740)=0x84) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000280), 0x1f4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 09:46:26 executing program 6: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0xfff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) [ 112.397705] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the chain 09:46:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) setfsuid(r1) 09:46:26 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000001280)="025cc80700145f8f764070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 112.437845] netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. 09:46:26 executing program 5: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000640)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000680)="6e00742f69705f6d725f6361ff01658f") r3 = socket$inet6(0xa, 0x3, 0x3a) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000700)={0x0, 0x17, &(0x7f0000000000)="5240e437d0613ac30b25e562f868cf69da4ddab893fb18"}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000200)=0x6) r4 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000400), &(0x7f00000004c0)=0x4) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e21, 0x8, @remote, 0xed6}, {0xa, 0x4e21, 0x8, @mcast1, 0x6}, 0x40aa, [0x6, 0x4, 0x401, 0x7fffffff, 0x10000, 0x6, 0x81, 0x6]}, 0x5c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f0000000800), &(0x7f0000000840)=0xc) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)=0x1) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000006c0)={0x0, 0x0, 0xffffffff, 0x68ca, 0x1}, 0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f0000000080)={@dev, @rand_addr, 0x0}, &(0x7f00000000c0)=0xff09) unshare(0x2000400) pipe(&(0x7f0000000140)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0x4, &(0x7f0000000340)={r7, 0x50, &(0x7f00000002c0)}, 0x10) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000100)={@empty, @empty, @mcast1, 0x200, 0x80000000081, 0x987, 0x400, 0x4, 0x1260312, r6}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000540)={0x3, 0x820d, 0x7fc0000000, 0x8001, 0x0}, &(0x7f0000000580)=0x10) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000780)=""/81) sync_file_range(r4, 0x9, 0x1fef721d, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000005c0)={0x5, 0x4, 0x8, 0x8, 0x2, 0xfffffffffffffffa, 0x0, 0x7, r8}, &(0x7f0000000600)=0x20) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x10}, 0x8}, {0xa, 0x4e24, 0xfff, @mcast1, 0x2}, 0x6, [0x4, 0x3, 0x9, 0x9, 0x0, 0x3f4b06b5, 0x1, 0x7]}, 0x5c) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r9, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x486) connect(r9, &(0x7f00000000c0)=@nl=@unspec, 0x80) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x9, @remote, 0xf8}}}, &(0x7f0000000740)=0x84) setsockopt$inet6_int(r3, 0x29, 0xc8, &(0x7f0000000280), 0x1f4) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000240)={0x2, 0x1, 0x6, 0x40, 0x7f}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, {0xa, 0x4e20, 0x0, @remote}, 0x0, [0x0, 0x0, 0x69c, 0x0, 0x4]}, 0x5c) 09:46:26 executing program 6: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0xfff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 09:46:26 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket(0x15, 0x80005, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000240)={'bridge_slave_1\x00', 0xffff}) 09:46:26 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x9, 0x1d, 0x8, 0x66, 0x14}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001f00), 0x0, 0x0, &(0x7f0000002040)={0x77359400}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000020c0)={'ip6gre0\x00'}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000380), &(0x7f00000000c0)}, 0x20) 09:46:27 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0//ile0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000340)) read$FUSE(r2, &(0x7f00000030c0), 0x1000) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b000000000066ce656d316e6f246576656d310000000000000000000000000000002c000000000000000000000000001c000000000000002b7379737465746a48be1b31486dcc6370757365746367726f7570246367726f000000000000000000000000000000000000000000000000"], 0x90) 09:46:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)="2f70726f632f7379732f0000000e000000000000072f6578706972655f6e6f646573745f636f6e6e00", 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xffffffffffffa2f7) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) lseek(r1, 0x400, 0x0) getdents(r1, &(0x7f0000000040)=""/148, 0xab) 09:46:27 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85714070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101080, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x6) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = socket(0xd, 0x8080e, 0x2) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000000)=@req3={0x2, 0x7fffffff, 0x5, 0x1f, 0x8, 0x2067, 0xa2c3}, 0x1c) bind$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, {}, 0x4, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000002780), &(0x7f00000027c0)=0xc) 09:46:27 executing program 6: recvfrom(0xffffffffffffffff, &(0x7f00000022c0)=""/4096, 0x1000, 0x0, &(0x7f0000002240)=@ipx={0x4, 0x0, 0x0, "5d6f634e9e66"}, 0x80) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a61000)='/dev/ptmx\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000040), 0xfff) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 09:46:27 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x2}, 0x0) poll(&(0x7f0000001080), 0x0, 0xffff) r1 = socket$inet(0x2, 0x4000000004000001, 0xfffffffffffffffc) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6}]}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) 09:46:27 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="e05b3f0a00145f8f764070") getsockname(r0, &(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000000c0)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xdc, r2, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9b63}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3389f3b1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x766}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x80}, 0x10) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xc) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x4107fc) ioctl$BLKROGET(r4, 0x125e, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000080)={0x3, 0x3, 0x100000001, 0x2, 0x80}) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xffffffffffffffff) ioctl$RTC_UIE_OFF(r4, 0x7004) 09:46:27 executing program 7: perf_event_open(&(0x7f0000000300)={0x800000000002, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) times(&(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x19, 0x4) 09:46:27 executing program 7: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) recvfrom$inet6(r0, &(0x7f0000000000)=""/85, 0x55, 0x3, &(0x7f0000000080)={0xa, 0x4e21, 0x235, @ipv4={[], [], @multicast1}, 0xfffffffffffff303}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000b, &(0x7f0000c29ffc)=0x2, 0x4) 09:46:27 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000182000)={&(0x7f0000000080)=ANY=[@ANYBLOB="060f00000b00000000000000fdffffff0200017b2d00000004d5ff000d0300000020030006000000000002000000ac14ffbb0000000000000000030005000000000002000000a414ffbb00000000000000000100180000000000"], 0x58}}, 0x0) 09:46:27 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") madvise(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xa) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r1, &(0x7f0000000040)='net/ip6_mr_vif\x00') madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x7) 09:46:27 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xfffffffffffffffd, 0x0) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {}, 0x7, 0x2}, 0xe) 09:46:27 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000400)={@multicast1, @multicast1, 0x0}, &(0x7f0000000440)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@dev, @multicast2, 0x0}, &(0x7f0000000540)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000002700)={@mcast1, 0x0}, &(0x7f0000002740)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003f00)={'bcsf0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f80)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003fc0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000040c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000009a80)={@local, 0x0}, &(0x7f0000009ac0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000009b00)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000009c00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f000000a240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000a200)={&(0x7f0000009c40)={0x584, r4, 0xc20, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x130, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x170, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x5, 0xffffffffffffff00, 0x8, 0x20}, {0x4e77, 0x43, 0x7, 0x1}, {0xffff, 0x0, 0x3}, {0x2, 0x7, 0x0, 0x1}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8, 0x1, r12}, {0x1f8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff39}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r15}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}]}, 0x584}, 0x1, 0x0, 0x0, 0x8000}, 0x20040800) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x820}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @local}}) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) dup3(r1, r2, 0x0) 09:46:27 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000240)={@ipv4={[], [], @broadcast}, 0x0}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000400)={@multicast1, @multicast1, 0x0}, &(0x7f0000000440)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000500)={@dev, @multicast2, 0x0}, &(0x7f0000000540)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000002700)={@mcast1, 0x0}, &(0x7f0000002740)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000003f00)={'bcsf0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f80)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000003fc0)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000040c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000009a80)={@local, 0x0}, &(0x7f0000009ac0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000009b00)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000009c00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f000000a240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f000000a200)={&(0x7f0000009c40)={0x584, r4, 0xc20, 0x70bd27, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x130, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x170, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x5, 0xffffffffffffff00, 0x8, 0x20}, {0x4e77, 0x43, 0x7, 0x1}, {0xffff, 0x0, 0x3}, {0x2, 0x7, 0x0, 0x1}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8, 0x1, r12}, {0x1f8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff39}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r15}, {0x74, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}]}}]}, 0x584}, 0x1, 0x0, 0x0, 0x8000}, 0x20040800) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x820}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={"766c616e300000f6ffffffffffffff00", {0x2, 0x0, @local}}) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) dup3(r1, r2, 0x0) 09:46:27 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x40) r1 = dup2(r0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00']}) 09:46:27 executing program 7: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000280)=0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r1, &(0x7f00000000c0)="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", &(0x7f00000001c0)=""/74}, 0x18) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x1) 09:46:27 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syzkaller1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001b00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e09fe000a000200aaaaaaaaaaaa0000"], 0x28}}, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0xbf60, 0xfcf}, {0x8, 0x68a845cb}, {0x1, 0x3}, {0x3ff, 0xffffffffffffffc1}]}) 09:46:28 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x1000000000000a, 0x80000000001, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syzkaller1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001b00070f000000000000000007000000", @ANYRES32=r2, @ANYBLOB="3e09fe000a000200aaaaaaaaaaaa0000"], 0x28}}, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[{0xbf60, 0xfcf}, {0x8, 0x68a845cb}, {0x1, 0x3}, {0x3ff, 0xffffffffffffffc1}]}) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c020000000000000000000000"]) getpeername(r1, &(0x7f0000000040)=@alg, &(0x7f0000000140)=0x80) 09:46:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b63b1d5bf65aaf0b869eb261431ec3bd05e381e5b3", 0x1f5) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007600)=[{{&(0x7f00000004c0)=@can, 0x80, &(0x7f0000003a40)=[{&(0x7f0000002a40)=""/4096, 0x1000}], 0x1, &(0x7f0000003b00)=""/82, 0x52}}], 0x3a8, 0x0, &(0x7f00000077c0)={0x77359400}) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x70, 0xffff, 0x5, 0x19c, 0x0, 0x0, 0x0, 0x2000, 0x1, 0x3, 0x2, 0x200, 0x6, 0x1ff, 0x400, 0x3, 0x9, 0xbf74, 0x1, 0x2, 0x9, 0x8, 0x4, 0x9, 0x7ff, 0x401, 0x7, 0x1f, 0x3, 0x6, 0x7f, 0x5cd, 0x5, 0xffffffff, 0x3, 0xc3, 0x7, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x20000, 0x36, 0x6, 0x3, 0x8, 0x1, 0x9}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x1, 0x70, 0xffff, 0x5, 0x80, 0x3e3, 0x0, 0x6f, 0x82, 0x8, 0x7fffffff, 0xfffffffffffffff8, 0xfffffffffffffff7, 0x100, 0xffff, 0x1, 0x8, 0x401, 0x2, 0x3, 0x4, 0x4, 0x0, 0x3537, 0x6, 0x7fff, 0x0, 0xf8, 0x9, 0x6, 0x3, 0x13, 0xfffffffffffffff7, 0x7, 0x4, 0x401, 0x0, 0x5, 0x0, 0x1, 0x4, @perf_config_ext={0x1f, 0x5}, 0x20422, 0x5, 0x6, 0x6, 0x8, 0x1, 0x4}) 09:46:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x400) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc008ae91, &(0x7f00000002c0)=ANY=[@ANYBLOB="0092000048b800807684b1c926cec82b5bfb3fac292c0e6614cac577df648cc16e8eed9964e747841e0bd54fa38380d785089d001e426687cc38240a7a340f3de95fbaadd88dd32c80299e12a932084a2a3d95d47649e7d0bcbfc341447051db397fcf4178ed9c6b47c36eafe08c0c7586c4271087c5c6f1acfda35dbdf760a614ae1800f4ffa9ec6a428329f483e7b9802d1bad08fef742bc9497790aa244e5278347db6f98d9548933b9fdb71a3f692cb5c371deca09bb4c65124a3a387f1259cfa1f204efb7c774c73519ea203c7fdfe3ce72ee26ab72e0c9ad38314b415ceebc77c25fd6d3aac6ea2c14f1e566820b02090c5d555555202821f57b30a7cdea45f98e826ae0d6177a37ec25aaafc970df01552eccfc2567b1720677af216d20955901565b4cd85236e47b54eb81dd12b8b67f24"]) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KDSKBLED(r5, 0x4b65, 0x9) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000040)={[{0x401, 0x80000001, 0xfffffffffffffffe, 0x401, 0x0, 0x41caea9, 0x401, 0x8, 0x0, 0xfffffffffffffff8, 0x1000, 0x10000, 0xe5}, {0x2, 0x6, 0x6d, 0xffffffffffffffc0, 0x0, 0xffffffff, 0x1000, 0x9, 0x1, 0x0, 0x9, 0x1}, {0x8, 0x0, 0xfffffffffffff801, 0x1, 0x40, 0x9, 0x40, 0x3, 0x0, 0x999, 0x7fff, 0x6, 0x55f7}]}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000000)=0x9) [ 114.066495] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 114.073614] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 114.081579] F2FS-fs (loop7): Encrypt feature is off [ 114.094518] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 114.101578] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 114.109526] F2FS-fs (loop7): Encrypt feature is off 09:46:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x400) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000180)=r3) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$KVM_SET_CPUID(r4, 0xc008ae91, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) r5 = fcntl$dupfd(r4, 0x0, r1) ioctl$KDSKBLED(r5, 0x4b65, 0x9) ioctl$KVM_SET_PIT(r5, 0x8048ae66, &(0x7f0000000040)={[{0x401, 0x80000001, 0xfffffffffffffffe, 0x401, 0x0, 0x41caea9, 0x401, 0x8, 0x0, 0xfffffffffffffff8, 0x1000, 0x10000, 0xe5}, {0x2, 0x6, 0x6d, 0xffffffffffffffc0, 0x0, 0xffffffff, 0x1000, 0x9, 0x1, 0x0, 0x9, 0x1}, {0x8, 0x0, 0xfffffffffffff801, 0x1, 0x40, 0x9, 0x40, 0x3, 0x0, 0x999, 0x7fff, 0x6, 0x55f7}]}) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r5, 0x40045532, &(0x7f0000000000)=0x9) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c020000000000000000000000"]) getpeername(r1, &(0x7f0000000040)=@alg, &(0x7f0000000140)=0x80) [ 114.123919] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 114.130974] F2FS-fs (loop7): Can't find valid F2FS filesystem in 1th superblock [ 114.145063] F2FS-fs (loop7): Encrypt feature is off [ 114.160872] F2FS-fs (loop7): Magic Mismatch, valid(0xf2f52010) - read(0x0) 09:46:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000000)="025cc80700145f8f764070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2800000012000101000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000008141d00040000000000000000"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 09:46:28 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2617, 0x101001) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0xffffffffffff, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000080)={[{@resize_auto='resize=duto'}]}) [ 114.221520] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 114.231241] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. [ 114.236134] FAT-fs (loop7): Unrecognized mount option "" or missing value 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c020000000000000000000000"]) getpeername(r1, &(0x7f0000000040)=@alg, &(0x7f0000000140)=0x80) [ 114.273585] REISERFS warning (device loop4): super-6507 reiserfs_parse_options: bad value duto for -oresize [ 114.273585] [ 114.312511] REISERFS warning (device loop4): super-6507 reiserfs_parse_options: bad value duto for -oresize [ 114.312511] 09:46:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180)=0x101, 0x4) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000005fd8)={'vcan0\x00', 0x0}) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r3, 0xaf02, 0x0) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) sendmsg$can_raw(r1, &(0x7f0000001fc8)={&(0x7f000000a000), 0xffd1, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0xffffff7f, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b50200000000000000004e2f9663a918fa1efd9b0b"}, 0x9d8}}, 0x0) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c020000000000000000000000"]) getpeername(r1, &(0x7f0000000040)=@alg, &(0x7f0000000140)=0x80) [ 114.312795] FAT-fs (loop7): Unrecognized mount option "" or missing value 09:46:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x8}, 0x2c) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0x2, 0x100, 0xfffffffffffffff8}) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe803, 0x1, &(0x7f0000000440)=[{&(0x7f0000010000)="eb3c90", 0x3}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c020000000000000000000000"]) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4, &(0x7f00000002c0)="025cc83d2a31000068ea81028b3f6f6cad84e7d1f88fc943") 09:46:28 executing program 4: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f000086fff4)) r3 = getpgrp(0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) r4 = getpid() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000000)={r2, r1}) [ 114.412583] FAT-fs (loop7): Unrecognized mount option "" or missing value [ 114.450670] FAT-fs (loop7): Unrecognized mount option "" or missing value 09:46:28 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000280)={"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"}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x4b1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1801, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000002480), 0x4000, &(0x7f0000000000)=ANY=[@ANYBLOB="726f6469729a696f636861727365743d63703935302c696f636861727365743d69736f383835392d31342c73686f72746e616d653d75697865642c00cc77346d36945b1ec3d3ffb5454be26e477fc9bdec9a1b52726157331f54ff86d2440c1f2d0c540aac4bb95dff21e83d58735c46c49f042226f914f66592ed360f0e20222f267cba06"]) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) socket$inet6(0xa, 0x1000000000002, 0x0) 09:46:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='sessionid\x00') setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), 0x4) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffd, 0x10031, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = dup2(r1, r1) write$P9_RLINK(r2, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) connect$inet6(r1, &(0x7f00000009c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0xa0, &(0x7f0000000140), 0x1, &(0x7f0000000140), 0x2d9}, 0xc100) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000001180)="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", 0x2b7}], 0x1, &(0x7f0000000e00)}, 0x8000) recvmsg(r1, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/40, 0x28}, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f0000000180)={0x81, @dev={[], 0x15}}) ioctl$RTC_EPOCH_SET(r3, 0x4008700e, 0x8000000000) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1, &(0x7f0000003b40)}, 0x0) getrlimit(0x7, &(0x7f0000000240)) 09:46:28 executing program 7: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0xbc}) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 114.527348] FAT-fs (loop4): Unrecognized mount option "rodiršiocharset=cp950" or missing value 09:46:28 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x1, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:28 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:28 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:28 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:28 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400), 0x0, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400), 0x0, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400), 0x0, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001600000002", 0x35, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001600000002", 0x35, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e0000001600000002", 0x35, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e00000000040000000400", 0x4f, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect$inet(r0, &(0x7f0000adf000)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=[@iv={0x18}], 0x2ae}, 0x0) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000080)=0x64100000, 0x4) r1 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r1, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r1, 0x1) r2 = socket$inet6(0xa, 0x1000000000000, 0x10000) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000004c0)={r3, @in, 0x0, 0x0, 0x4, 0x3, 0x34}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e21}}, 0x0, 0x0, 0x10000, 0x0, 0x200000000000000c}, 0x98) 09:46:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x1, 0x0) write$P9_RLOCK(r2, &(0x7f0000000100)={0x8, 0x35, 0x1, 0x1}, 0x8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x20, r3, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8}]}]}, 0x20}}, 0x0) 09:46:29 executing program 6: r0 = socket(0x40000000002, 0x3, 0x2) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0xfffffffd}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x3}}}}}}}, &(0x7f0000000040)) r1 = dup(r0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000000c0)={{0x3, 0x5e55}, {0x100000000, 0x6}, 0x2, 0x6, 0x6}) 09:46:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) poll(&(0x7f0000000000)=[{r1}], 0x1, 0x1) ioctl$TIOCSSOFTCAR(r1, 0x5412, &(0x7f0000000100)=0x4) 09:46:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) sendmsg$key(r1, &(0x7f00000001c0)={0x20480, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="0276d322895600000002002c00000000"], 0x3a8}}, 0x0) 09:46:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) io_setup(0x8, &(0x7f0000000140)=0x0) r4 = socket(0x1e, 0x1000000000005, 0x0) io_getevents(r3, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}) sendmsg(r4, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f0000000300), 0x0, &(0x7f000016cf61)}, 0x0) r5 = dup2(r2, r1) io_submit(r3, 0x101, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000001c0)="0f293a7660c2e7c49fa09272835aa3fd4e50ec1313e1fbeb7a147d5db7ad6b9a8d874deeed9eeb5b3f13f4c1dca33738e4b40dc2edb305cb34b15d8beee7a52518cf37ed5979a458170afe7f032fdcab356194c9976f71ea6694991bd3e448e195beadc2d63fb915d9c7b04fda65ea62ef2c1283cf94436103616b5a37ef873f63e3661392346ed9615dfc7093b8338ba5562ef2c7a104a073bddd05f6f8a3eb374de7f8a278f27d1f3823b618dc1fa1f4145de4952361a4", 0xfffffe3f, 0x80, 0x0, 0x1, r5}]) 09:46:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x1}) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'irlan0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="03"]}) 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f00000004c0)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 09:46:29 executing program 2: mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000080), 0x8) [ 115.448806] netlink: 'syz-executor5': attribute type 1 has an invalid length. 09:46:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025c3f0a00145f8f764070") syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='shortname=win95,iocharset=iso8859-2']) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r1) open$dir(&(0x7f0000000080)='./file1\x00', 0x1ffffd, 0x0) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) 09:46:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1, 0x48000000) 09:46:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x1a, 0x0, 0x0) [ 115.513897] netlink: 'syz-executor5': attribute type 1 has an invalid length. [ 115.534193] hfs: can't find a HFS filesystem on dev loop6 09:46:29 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000", 0x5c, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 115.586169] hfs: can't find a HFS filesystem on dev loop6 09:46:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='task\x00') r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000240)="025cc83d6d345f8f762070") exit(0x0) getdents(r0, &(0x7f0000000180)=""/58, 0x3a) getdents(r0, &(0x7f0000000040)=""/202, 0x45a40b78) 09:46:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = memfd_create(&(0x7f00000000c0)='dev ', 0x3) write(r1, &(0x7f0000000040)="16", 0x1) sendfile(r1, r1, &(0x7f0000001000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) r2 = gettid() ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) clone(0x0, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000000)) 09:46:30 executing program 6: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)) 09:46:30 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:30 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x0) readv(r0, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) 09:46:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=@newlink={0x50, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}, @IFLA_TXQLEN={0x8}]}, 0x50}}, 0x0) 09:46:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x5450, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) 09:46:30 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000556ff0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00001e1000)={{0x4000001ff, 0x80000a}, {0x1}}) 09:46:30 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:30 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000008000)=ANY=[], &(0x7f0000008000)='syzkaller\x00', 0x1025, 0x7f, &(0x7f0000000b00)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=@framed={{}, [@alu={0x7}]}, &(0x7f000000b000)='syzkaller\x00', 0x7e0, 0x418, &(0x7f0000002f19)=""/231}, 0x48) 09:46:30 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x14, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) 09:46:30 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000", 0x63, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 09:46:30 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write(r0, &(0x7f0000000180)="8d", 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) read(r0, &(0x7f0000000080)=""/52, 0x34) 09:46:30 executing program 1: r0 = memfd_create(&(0x7f0000000140)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) getsockopt$bt_hci(r1, 0x10d, 0x0, &(0x7f0000000080)=""/86, &(0x7f0000000000)=0x56) 09:46:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x5450, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) 09:46:30 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000700), 0x10) modify_ldt$write(0x1, &(0x7f0000000cc0), 0x10) 09:46:31 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='nfs4\x00', 0x0, 0x0) 09:46:31 executing program 6: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x3, &(0x7f0000000600), 0x4) 09:46:31 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 09:46:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x5450, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) 09:46:31 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x8}}) close(r2) close(r1) 09:46:31 executing program 4: r0 = eventfd2(0x0, 0x0) io_setup(0x800000020, &(0x7f00000001c0)=0x0) r2 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000ddc000), 0x0, 0x0, 0x0, 0x1, r0}]) 09:46:31 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:31 executing program 6: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3020, 0x0) lchown(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 09:46:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 09:46:31 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x5450, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f00000000c0)}) 09:46:31 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40085203, &(0x7f0000000540)=0x56) 09:46:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000500), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x701, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0x4}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9effffff}]}, 0x3c}}, 0x0) 09:46:31 executing program 3: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:31 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x8}}) close(r2) close(r1) 09:46:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000001f000)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha3-224-generic,cbc-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0), 0x0) 09:46:31 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100", 0x66, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:31 executing program 6: r0 = socket$inet6(0xa, 0x1001000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) 09:46:31 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000cc0000)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000003c0)={0x1, &(0x7f0000000140)=[{}]}) 09:46:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001d000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f0000000040)="66baf80cb8afa4e184ef66bafc0cec660f388183b8b91270c4c1ad73d4ca660f388084822741aace0f30d2edc4c2f931a1b48800000f35360f21b0c4c1e9f809", 0x40}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000000b000/0x18000)=nil, &(0x7f0000000200)=[@text16={0x10, &(0x7f0000000000)="0f01b43ca73e0f01b200080ffeaa06002ed9f5d1bbbb00660ff8080f06f3650f35660f5b3ff69e0000", 0x29}], 0x1, 0x0, &(0x7f0000000240), 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000000000007"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:46:31 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$unix(0x1, 0x20000000000002, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7f"], 0x1, 0x0) timer_create(0x0, &(0x7f0000ec5000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000000000)) tkill(0x0, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/230}, 0xee, 0x3, 0x2000) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 09:46:31 executing program 2: perf_event_open(&(0x7f0000000f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000080)=""/255, 0xff}], 0x259) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 09:46:31 executing program 3: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:31 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x8}}) close(r2) close(r1) 09:46:31 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 117.451042] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) [ 117.483530] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:46:31 executing program 5: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:31 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") unshare(0x20000400) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fstatfs(r1, &(0x7f00000002c0)=""/4096) 09:46:31 executing program 3: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:31 executing program 2: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0xe) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00006ee000)='/dev/rfkill\x00', 0x0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) readv(r0, &(0x7f00001f2ff0)=[{&(0x7f0000001fb2)=""/1, 0x1}], 0x1) ppoll(&(0x7f0000db7fd0)=[{r0}], 0x1, &(0x7f0000542000), &(0x7f0000181000), 0x8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000000040)) read(r0, &(0x7f0000000100)=""/197, 0xc5) ioctl$UFFDIO_UNREGISTER(r1, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) [ 117.540106] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0x66ec0cfc00000000 09:46:31 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 117.605766] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0x66ec0cfc00000000 09:46:31 executing program 5: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:31 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f00000000c0)=@ethtool_link_settings={0x8}}) close(r2) close(r1) 09:46:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x7, 0x1f, 0x201a7f1a, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 09:46:31 executing program 6: r0 = socket$inet6(0xa, 0x1001000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) [ 117.649875] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.670681] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0x66ec0cfc00000000 09:46:32 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001000000", 0x68, 0x1400}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) [ 117.733558] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0x66ec0cfc00000000 [ 117.781423] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 117.834781] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.862070] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0x66ec0cfc00000000 [ 117.875313] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0x66ec0cfc00000000 [ 117.886909] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.898888] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0x66ec0cfc00000000 [ 117.908356] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0x66ec0cfc00000000 [ 117.919687] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.931555] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc1 data 0x66ec0cfc00000000 [ 117.940961] kvm [7420]: vcpu0, guest rIP: 0x9128 disabled perfctr wrmsr: 0xc2 data 0x66ec0cfc00000000 [ 117.952139] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.965846] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.979556] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 117.993329] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 118.006997] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 [ 118.020847] kvm [7420]: vcpu0, guest rIP: 0x9128 ignored wrmsr: 0x11e data 0x66ec0cfc00000000 09:46:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@newqdisc={0x24, 0x24, 0x7, 0x0, 0x0, {0x0, r1, {}, {0x0, 0xe}}}, 0x24}}, 0x0) 09:46:32 executing program 3: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 09:46:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000003, 0x100000003) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 09:46:32 executing program 5: r0 = epoll_create1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 09:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1001000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) 09:46:32 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r1 = getpgrp(0x0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xffffffffffffff7f}, 0x0, 0x8) r3 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r1, r2, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x3}) read(r3, &(0x7f0000481000)=""/128, 0x3be) 09:46:32 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:32 executing program 5: syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000001980)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 118.118083] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1001000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) sendto$inet6(r3, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) 09:46:32 executing program 1: mlockall(0x2) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ff1000/0xf000)=nil, 0x6000) 09:46:32 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000280)=""/162, 0xa2}], 0x1) 09:46:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00004a5000)={0x0, 0x1c, &(0x7f0000519fa8)=[@in6={0xa, 0x0, 0x0, @mcast1, 0x17}]}, &(0x7f0000000000)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000519fa8)=@framed={{}, [@ldst={0x2, 0x0, 0xb, 0x7a, 0x0, 0xffffff50}]}, &(0x7f0000c43000)='syzkaller\x00', 0xfffffffffffffffa, 0x1000, &(0x7f0000d35000)=""/4096}, 0x48) 09:46:32 executing program 2: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x24020400) pselect6(0x40, &(0x7f0000f33fc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f0000086000), &(0x7f0000349000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000a65ff8), 0x8}) 09:46:32 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x1d, &(0x7f0000000040), 0x4) 09:46:32 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x104e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 09:46:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x8000000000010, &(0x7f0000000000)="17000000020001000003be8c5ee17688a2000008010300ec1f01000100030000000000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f5009cee4a5acb3da400001fb700670000c88ebbff060115003901000000000000ea000000000000000002ffff02df9eebe7ec7ee87cccebf6ba000840024f0298e9e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e019b748700000000000000000000000", 0xb8) 09:46:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x10d, 0x1, &(0x7f0000000200), 0x4) [ 118.284216] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 09:46:32 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69}], 0x0, &(0x7f0000000000)={[{@test_dummy_encryption='test_dummy_encryption'}]}) 09:46:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETSF(r0, 0x5457, &(0x7f0000000000)) 09:46:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4543(gcm(aes-generic)))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d179f20600000000001c14b1048c5b1bd2e7fcd330451c64b8614fcff9671a5cf54ab025", 0x24) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000001500)=ANY=[], 0xfffffd72) recvmsg(r1, &(0x7f0000000700)={&(0x7f0000000640)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x33ff0, &(0x7f00000006c0), 0x6, &(0x7f0000000180)=""/2, 0xffffffdd}, 0x0) 09:46:32 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x0, 0x0, 0x0, 0x8a}}, 0xa) 09:46:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000030c0), 0x1000) read$FUSE(r1, &(0x7f0000002000), 0x1000) chdir(&(0x7f0000000180)='./file0\x00') write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) [ 118.432875] do_dccp_setsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app 09:46:32 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) poll(&(0x7f0000001080), 0x0, 0xffff) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000240)=""/167, 0xa7}], 0x1) signalfd(r1, &(0x7f0000000000), 0x8) 09:46:32 executing program 7: syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010400)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c00000010000000140000030000000100000002", 0x69, 0x1400}], 0x0, &(0x7f0000000000)) 09:46:32 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID2(r3, 0x4008ae90, &(0x7f0000000340)={0x2, 0x0, [{0x7, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, {0x1, 0x0, 0x0, 0x0, 0x0, 0x3f}]}) 09:46:32 executing program 4: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="00000000000000000000110000002800030014000200007064647030000000000000000000000800040000000000080001000000000014000100080009"], 0x3}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x36200}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000180)={0xffce, 0x2e, 0x6fd, 0x0, 0x0, {0x2004}, [@nested={0xc, 0x0, [@typed={0x62, 0x0, @ipv4}]}]}, 0xffce}}, 0x0) 09:46:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85714070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000532000)=0x19) [ 118.568768] attempt to access beyond end of device [ 118.573803] loop7: rw=12288, want=8200, limit=20 [ 118.588182] netlink: 65342 bytes leftover after parsing attributes in process `syz-executor4'. [ 118.597039] openvswitch: netlink: Message has 8 unknown bytes. [ 118.610845] kasan: CONFIG_KASAN_INLINE enabled [ 118.615495] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 118.622944] general protection fault: 0000 [#1] SMP KASAN [ 118.628483] CPU: 1 PID: 7615 Comm: syz-executor7 Not tainted 4.18.0-rc7-next-20180801+ #29 [ 118.636874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.646242] RIP: 0010:validate_checkpoint+0x66d/0xec0 [ 118.651424] Code: e8 58 05 7f fe 4c 8d 6b 80 4d 8d 74 24 08 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 c6 04 02 00 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 f4 06 00 00 4c 89 ea 4d 8b 7c 24 08 48 b8 00 00 [ 118.670305] RSP: 0018:ffff8801937cebe8 EFLAGS: 00010246 [ 118.675651] RAX: dffffc0000000000 RBX: ffff8801937cef30 RCX: ffffc90006035000 [ 118.682902] RDX: 0000000000000000 RSI: ffffffff82fd9658 RDI: 0000000000000005 [ 118.690154] RBP: ffff8801937cef58 R08: ffff8801ab254700 R09: fffff94000d9e026 [ 118.697407] R10: fffff94000d9e026 R11: ffffea0006cf0137 R12: fffffffffffffffb [ 118.704656] R13: ffff8801937ceeb0 R14: 0000000000000003 R15: ffff880193419b40 [ 118.711907] FS: 00007f36a61d5700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 118.720114] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.725973] CR2: 00007fc04ff93000 CR3: 00000001d0562000 CR4: 00000000001426e0 [ 118.733226] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 118.740479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 118.747726] Call Trace: [ 118.750305] ? get_checkpoint_version+0x620/0x620 [ 118.755133] ? save_stack+0xa9/0xd0 [ 118.758740] ? save_stack+0x43/0xd0 [ 118.762361] ? kasan_kmalloc+0xc4/0xe0 [ 118.766233] ? __kmalloc+0x14e/0x760 [ 118.769928] ? f2fs_get_valid_checkpoint+0x390/0x1ec0 [ 118.775100] ? f2fs_fill_super+0x2d42/0x8110 [ 118.779493] ? mount_bdev+0x314/0x3e0 [ 118.783272] ? f2fs_mount+0x3c/0x50 [ 118.786884] ? vfs_get_tree+0x1cb/0x5c0 [ 118.790841] ? do_mount+0x6f2/0x1e20 [ 118.794540] ? ksys_mount+0x12d/0x140 [ 118.798324] ? __x64_sys_mount+0xbe/0x150 [ 118.802460] ? do_syscall_64+0x1b9/0x820 [ 118.806507] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 118.811857] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 118.816861] ? map_id_range_down+0x1ee/0x430 [ 118.821262] ? lock_acquire+0x1e4/0x540 [ 118.825222] ? __kmalloc+0x54d/0x760 [ 118.828920] ? lock_downgrade+0x8f0/0x8f0 [ 118.833055] ? kasan_check_read+0x11/0x20 [ 118.837184] ? do_raw_spin_unlock+0xa7/0x2f0 [ 118.841574] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 118.846136] ? kasan_unpoison_shadow+0x35/0x50 [ 118.850697] ? kasan_kmalloc+0xc4/0xe0 [ 118.854569] ? __kmalloc+0x315/0x760 [ 118.858272] ? f2fs_get_valid_checkpoint+0x390/0x1ec0 [ 118.863450] f2fs_get_valid_checkpoint+0x436/0x1ec0 [ 118.868456] ? _raw_spin_unlock+0x22/0x30 [ 118.872588] ? f2fs_recover_orphan_inodes+0x1180/0x1180 [ 118.877938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.883456] ? f2fs_iget+0x4f5/0x4fa0 [ 118.887239] ? __debug_object_init+0x581/0x12e0 [ 118.891894] ? lock_downgrade+0x8f0/0x8f0 [ 118.896028] ? lock_downgrade+0x8f0/0x8f0 [ 118.900165] ? kasan_check_read+0x11/0x20 [ 118.904298] ? f2fs_inode_chksum_set+0xf0/0xf0 [ 118.908864] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 118.913430] ? kasan_check_write+0x14/0x20 [ 118.917650] ? trace_hardirqs_on+0xd/0x10 [ 118.921780] ? __debug_object_init+0x581/0x12e0 [ 118.926434] ? lock_acquire+0x1e4/0x540 [ 118.930430] ? debug_object_activate+0x41a/0x690 [ 118.935172] ? lock_downgrade+0x8f0/0x8f0 [ 118.939305] ? save_stack+0x43/0xd0 [ 118.942929] ? kasan_check_read+0x11/0x20 [ 118.947061] ? do_raw_spin_unlock+0xa7/0x2f0 [ 118.951457] ? lock_acquire+0x1e4/0x540 [ 118.955415] ? __percpu_counter_init+0x2ad/0x370 [ 118.960157] ? lock_downgrade+0x8f0/0x8f0 [ 118.964289] ? kasan_check_read+0x11/0x20 [ 118.968426] ? do_raw_spin_unlock+0xa7/0x2f0 [ 118.972819] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 118.977385] ? kasan_check_write+0x14/0x20 [ 118.981614] ? do_raw_spin_lock+0xc1/0x200 [ 118.985833] ? trace_hardirqs_on+0xd/0x10 [ 118.989970] ? __percpu_counter_init+0x2b2/0x370 [ 118.994715] ? percpu_counter_cpu_dead+0x1c0/0x1c0 [ 118.999625] ? __init_waitqueue_head+0x9e/0x150 [ 119.004278] ? init_wait_entry+0x1c0/0x1c0 [ 119.008502] f2fs_fill_super+0x2d42/0x8110 [ 119.012722] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 119.017727] ? f2fs_commit_super+0x400/0x400 [ 119.022118] ? prealloc_shrinker+0x231/0x4a0 [ 119.026505] ? __init_waitqueue_head+0x9e/0x150 [ 119.031155] ? check_same_owner+0x340/0x340 [ 119.035459] ? __lockdep_init_map+0x105/0x590 [ 119.039948] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 119.044945] ? widen_string+0xe0/0x2e0 [ 119.048814] ? format_decode+0xaf0/0xaf0 [ 119.052864] ? string+0x225/0x2d0 [ 119.056300] ? widen_string+0x2e0/0x2e0 [ 119.060257] ? register_shrinker_prepared+0x15b/0x1c0 [ 119.065432] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.070948] ? bdev_name.isra.8+0x1a1/0x1f0 [ 119.075251] ? pointer+0x157/0x990 [ 119.078782] ? netdev_bits+0xb0/0xb0 [ 119.082475] ? format_decode+0x1b1/0xaf0 [ 119.086516] ? set_precision+0xe0/0xe0 [ 119.090387] ? do_raw_spin_unlock+0xa7/0x2f0 [ 119.094781] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 119.100297] ? vsnprintf+0x20d/0x1b60 [ 119.104088] ? vsprintf+0x40/0x40 [ 119.107524] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 119.112521] ? set_blocksize+0x2c1/0x340 [ 119.116580] mount_bdev+0x314/0x3e0 [ 119.120193] ? mount_bdev+0x314/0x3e0 [ 119.123974] ? f2fs_commit_super+0x400/0x400 [ 119.128369] f2fs_mount+0x3c/0x50 [ 119.131805] ? kill_f2fs_super+0x330/0x330 [ 119.136023] legacy_get_tree+0x131/0x460 [ 119.140073] vfs_get_tree+0x1cb/0x5c0 [ 119.143860] ? vfs_set_fs_source+0x12c/0x180 [ 119.148254] do_mount+0x6f2/0x1e20 [ 119.151778] ? check_same_owner+0x340/0x340 [ 119.156080] ? lock_release+0xa30/0xa30 [ 119.160040] ? copy_mount_string+0x40/0x40 [ 119.164260] ? kasan_kmalloc+0xc4/0xe0 [ 119.168132] ? kmem_cache_alloc_trace+0x318/0x780 [ 119.172956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 119.178485] ? _copy_from_user+0xdf/0x150 [ 119.182618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 119.188139] ? copy_mount_options+0x285/0x380 [ 119.192617] ksys_mount+0x12d/0x140 [ 119.196229] __x64_sys_mount+0xbe/0x150 [ 119.200187] do_syscall_64+0x1b9/0x820 [ 119.204055] ? finish_task_switch+0x1d3/0x870 [ 119.208700] ? syscall_return_slowpath+0x5e0/0x5e0 [ 119.213613] ? syscall_return_slowpath+0x31d/0x5e0 [ 119.218523] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 119.223523] ? __switch_to_asm+0x34/0x70 [ 119.227564] ? __switch_to_asm+0x34/0x70 [ 119.231605] ? __switch_to_asm+0x40/0x70 [ 119.235646] ? __switch_to_asm+0x34/0x70 [ 119.239690] ? __switch_to_asm+0x40/0x70 [ 119.243734] ? __switch_to_asm+0x34/0x70 [ 119.247789] ? __switch_to_asm+0x40/0x70 [ 119.251833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 119.256658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 119.261830] RIP: 0033:0x45943a [ 119.265019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9a 8a fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 119.283898] RSP: 002b:00007f36a61d4a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 119.291587] RAX: ffffffffffffffda RBX: 00007f36a61d4b30 RCX: 000000000045943a [ 119.298836] RDX: 00007f36a61d4ad0 RSI: 0000000020000100 RDI: 00007f36a61d4af0 [ 119.306086] RBP: 0000000020000100 R08: 00007f36a61d4b30 R09: 00007f36a61d4ad0 [ 119.313510] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000013 [ 119.320757] R13: 0000000000000000 R14: 00000000004c8ea0 R15: 0000000000000000 [ 119.328013] Modules linked in: [ 119.331187] Dumping ftrace buffer: [ 119.334709] (ftrace buffer empty) [ 119.338452] ---[ end trace bd8550c129352286 ]--- [ 119.343226] RIP: 0010:validate_checkpoint+0x66d/0xec0 [ 119.348441] Code: e8 58 05 7f fe 4c 8d 6b 80 4d 8d 74 24 08 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 c6 04 02 00 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 f4 06 00 00 4c 89 ea 4d 8b 7c 24 08 48 b8 00 00 [ 119.367357] RSP: 0018:ffff8801937cebe8 EFLAGS: 00010246 [ 119.372745] RAX: dffffc0000000000 RBX: ffff8801937cef30 RCX: ffffc90006035000 [ 119.380025] RDX: 0000000000000000 RSI: ffffffff82fd9658 RDI: 0000000000000005 [ 119.384366] netlink: 65342 bytes leftover after parsing attributes in process `syz-executor4'. [ 119.387315] RBP: ffff8801937cef58 R08: ffff8801ab254700 R09: fffff94000d9e026 [ 119.396076] openvswitch: netlink: Message has 8 unknown bytes. [ 119.403315] R10: fffff94000d9e026 R11: ffffea0006cf0137 R12: fffffffffffffffb 09:46:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00008f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) r1 = socket$inet6(0xa, 0x1000000000005, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85714070") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000532000)=0x19) 09:46:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34578f762070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000140)={0x84, @broadcast, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 '}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 09:46:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000380)='./file0//ile0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) write(r0, &(0x7f0000c34fff), 0xffffff0b) ioctl$TCSETSF(r0, 0x5457, &(0x7f0000000000)) [ 119.403328] R13: ffff8801937ceeb0 R14: 0000000000000003 R15: ffff880193419b40 [ 119.423835] FS: 00007f36a61d5700(0000) GS:ffff8801db100000(0000) knlGS:0000000000000000 [ 119.432080] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 119.437996] CR2: 00007fc04ff93000 CR3: 00000001d0562000 CR4: 00000000001426e0 [ 119.445296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 119.452599] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 119.459886] Kernel panic - not syncing: Fatal exception [ 119.465607] Dumping ftrace buffer: [ 119.469157] (ftrace buffer empty) [ 119.472843] Kernel Offset: disabled [ 119.476454] Rebooting in 86400 seconds..