r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 292.579823] XFS (nullb0): Invalid superblock magic number 20:33:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400), 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:08 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 292.833952] XFS (nullb0): Invalid superblock magic number [ 293.085651] XFS (nullb0): Invalid superblock magic number 20:33:08 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x4a0081) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) fchmod(r1, 0xfeebbcdf03bb090f) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newtaction={0x34, 0x31, 0xffff, 0x0, 0x0, {}, [{0x20, 0x1, [@m_tunnel_key={0x1c, 0x1, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x4}, {0x4}}}]}]}, 0x34}}, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xc0c2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000100)={0x1, 0x1}, 0x2) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40000, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000180)) 20:33:08 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:08 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90", 0x3f) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:09 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r4, 0x0, 0x27, &(0x7f0000000140)={@private=0xa010102, @local, @rand_addr=0x64010102}, 0xc) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r7 = open(&(0x7f0000000180)='./bus\x00', 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x8000000}) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000100)='\v', 0x1}]) r8 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r8, 0x0, 0x8400fffffffb) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000280)={0x7ff, 0x7, 0x4, 0x40, 0xbc, {}, {0x0, 0x2, 0xbc, 0x1, 0x1f, 0xb9, "818a4288"}, 0x2551, 0x4, @offset=0x1ff, 0x1, 0x0, 0xffffffffffffffff}) connect$caif(r9, &(0x7f0000000200)=@dgm={0x25, 0xc205, 0x6}, 0x18) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) [ 293.522715] audit: type=1804 audit(1589833989.157:61): pid=13650 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir309918306/syzkaller.hW9gy4/142/bus" dev="sda1" ino=15906 res=1 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 293.598928] XFS (nullb0): Invalid superblock magic number 20:33:09 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 293.631613] audit: type=1804 audit(1589833989.207:62): pid=13650 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir309918306/syzkaller.hW9gy4/142/bus" dev="sda1" ino=15906 res=1 20:33:09 executing program 4: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100)=0x9, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x0, &(0x7f00000004c0)) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[], 0x2e7) sendfile(r2, r2, &(0x7f0000000480), 0xa198) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x9c}}, 0x0) dup(0xffffffffffffffff) read(r3, &(0x7f0000000080)=""/122, 0x7a) 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:09 executing program 1: sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="04000000070605e50000000000000003000000000500010006f94be9e30890ed9b165cbdcfee808c566de4cf13"], 0x1c}}, 0x0) socket(0x10, 0x80002, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f0000000180)=""/174, &(0x7f0000000080)=0xae) sendmmsg$alg(r1, &(0x7f0000000100), 0x0, 0x20000090) 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf2", 0x5e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:09 executing program 1: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r2, 0xab9535e9a6578fc1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x100, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY={0x28, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "35f12795fef6ad7204b8c8619a"}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "d5f7c17e34"}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x2000c000}, 0x40000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000180)=0xccf3, &(0x7f0000000240)=0x4) syz_emit_ethernet(0x66, &(0x7f00000001c0)={@local, @link_local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x6558}, {}, {}, {0x8, 0x88be, 0x88caffff}}}}}}, 0x0) 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:09 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/165, 0xa5}], 0x1, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "0192070000fffffffffffffa00009f14200100"}) pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000001c0)='NLBL_CALIPSO\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x10480000008101ee, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000070053ef", 0x4db, 0x400}], 0x4810, 0x0) 20:33:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a7", 0x6e) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 294.324201] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 294.379267] EXT4-fs (loop1): filesystem is read-only [ 294.434669] EXT4-fs (loop1): first meta block group too large: 1279345503 (group descriptor block count 1) 20:33:10 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x22, &(0x7f0000000200)={0x0, 0x5, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f00000000c0)) [ 294.566866] EXT4-fs (loop1): feature flags set on rev 0 fs, running e2fsck is recommended [ 294.595523] EXT4-fs (loop1): Couldn't mount because of unsupported optional features (30301020) 20:33:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00'}) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:10 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) bind$packet(r0, &(0x7f0000000000), 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:10 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2", 0x76) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:10 executing program 1: perf_event_open(&(0x7f0000000080)={0x49df181a03c86343, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x4000, 0xfffffffffffffffc, 0x2, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clock_gettime(0x7, &(0x7f0000000200)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000002c0)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{r0, r1+10000000}, {0x77359400}}, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x101, &(0x7f00000004c0)=0x0) io_submit(r3, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r2, &(0x7f0000000000)="98", 0x3e80000000}]) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)='em1vboxnet0posix_acl_access%md5sum\x00') bind$inet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x901b112f1ca8c1ce) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uhid\x00', 0x2, 0x0) sysfs$1(0x1, &(0x7f0000000100)='/dev/sg0\x00') ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) 20:33:10 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:10 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) bind$packet(r0, &(0x7f0000000000), 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:11 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000100)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x22, &(0x7f0000000200)={0x0, 0x5, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f00000000c0)) 20:33:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) bind$packet(r0, &(0x7f0000000000), 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:11 executing program 1: bind$llc(0xffffffffffffffff, &(0x7f00000002c0), 0x10) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000240)=ANY=[@ANYBLOB='/dev/nullb2\x00'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_EDID(r3, 0xc0285628, &(0x7f0000000300)={0x0, 0x3d, 0xda90, [], &(0x7f0000000180)=0x81}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x29f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VT_OPENQRY(r7, 0x5600, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r5, &(0x7f0000000000)='threaded\x00', 0x248800) 20:33:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:11 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090", 0x7c) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:12 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:12 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:12 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:12 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:12 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c03166", 0x7a) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:12 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000000)="25bcc574769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1500004}}]}) 20:33:13 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x485ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x400000, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000040)={&(0x7f00002aa000/0x3000)=nil, &(0x7f0000418000/0x1000)=nil, 0x3000}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000004, 0x1010, 0xffffffffffffffff, 0x0) 20:33:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) r3 = socket(0x1e, 0x4, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$bt_sco(r3, &(0x7f0000000080)={0x1f, @none}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDDISABIO(r5, 0x4b37) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r7, 0xc02064b2, &(0x7f0000000000)={0x10000, 0x0, 0x3f, 0x4, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000040)={r8}) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) getpeername$ax25(r3, &(0x7f0000000180)={{0x3, @rose}, [@bcast, @default, @rose, @rose, @remote, @bcast, @rose]}, &(0x7f00000000c0)=0x48) shutdown(r0, 0x0) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 1: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "aebde1ce"}, 0x5, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) dup3(r1, r0, 0x0) io_setup(0x40000000008, &(0x7f0000000240)=0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x8001) mq_notify(r5, &(0x7f0000000180)={0x0, 0x2c, 0x2, @tid=r3}) r6 = syz_open_procfs(r3, &(0x7f0000000140)='net/ip6_flowlabel\x00') write$input_event(r6, &(0x7f0000000180)={{0x77359400}, 0x0, 0x9, 0x8000}, 0x18) io_submit(r2, 0x1, &(0x7f00000011c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 20:33:13 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 297.631033] EXT4-fs (loop4): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 20:33:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x8000000000000008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) [ 297.736765] EXT4-fs (loop4): EXT4-fs: inode_readahead_blks must be 0 or a power of 2 smaller than 2^31 20:33:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x800, 0x1) recvmmsg(r1, &(0x7f0000001c40)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_yield() clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0xaf601, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) 20:33:13 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xbffa, 0x40, "078cf0251c0e00"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_proto_private(r2, 0x89ee, &(0x7f0000000040)="6f67ac9ae1185e066d89d66224d5f76774eae15440b2a67e1f7ebc5a6a3000cb5b90406f52ba1ed53a2e97dc0fd6d8f3a689c65ccc57f7bbf2f059ff46a5624659239d80d5b43102ada2d989c812c67302e2363847884f83c05cfa7068bd1a131d417061b79327ecab2df203e1684ff7e5ee446457a3b4599fc6bb2f4cfbdb3baff100f5c64683953647cbc019f87140032c5f615311f759596e381e7ede83978df185f6b0974e") r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socket$inet6(0xa, 0x140000080806, 0x0) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000fdfdffff00"}) 20:33:13 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000440)={0x1, "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"}, 0x102, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/153) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x404000, 0x0) write$FUSE_GETXATTR(r2, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x20}}, 0x18) shutdown(r0, 0x0) 20:33:13 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2008, 0xfffffffffffffffe, 0x101, 0x5}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r1, &(0x7f0000000000)="401b3458374d424c569759ec40635ec15b9516fbf97be1f351d7", 0x1a, 0x40851, &(0x7f0000000040)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) shutdown(r2, 0x0) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:13 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0xfffffffeffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r1 = syz_open_procfs(0x0, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000080)={0xa88, 0x0, 0x0, 'queue1\x00', 0x4}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x4e20, 0x7f, @mcast2, 0x140000}, {0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x13}, 0x3f}, 0x1000, [0x8, 0x2, 0x1, 0x10001, 0x3, 0x0, 0x8, 0x8]}, 0x5c) process_vm_readv(0x0, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f0000002540), 0x0, 0x0) open(0x0, 0x481, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001880)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4}}, [@filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @rand_addr=' \x01\x00'}]}}]}, 0x48}}, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 20:33:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2a00, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x0, 0x0, 0x9, 0x3}, 0x0, 0xd, r1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) shutdown(r2, 0x0) prctl$PR_SET_FPEMU(0xa, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f0000000080)={0x8, {0xffff, 0x12, 0x0, 0x4, 0xfffff000, 0x7}}) openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/seq\x00', 0x80201) 20:33:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 298.474083] hub 9-0:1.0: USB hub found [ 298.491681] hub 9-0:1.0: 8 ports detected [ 298.562211] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 298.713629] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:33:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000000)) 20:33:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:14 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000280)={0x3, 0x2, "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"}) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ttyprintk\x00', 0x202180, 0x0) dup(r0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x2000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000a40), 0x8) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x28007d) fallocate(0xffffffffffffffff, 0xb5, 0x7fff, 0x9) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x408, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x3}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xc0}]}, 0x24}}, 0x4008004) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2f6465762f6e756c6c030000"], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) shutdown(r0, 0x0) 20:33:14 executing program 1: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000500)={@null=' \x00', 0x2, 'veth1_to_team\x00'}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000480)={0x0, @local, @multicast1}, &(0x7f00000004c0)=0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x9c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@ipv4_getaddr={0x60, 0x16, 0x220, 0x70bd25, 0x25dfdbfb, {0x2, 0x19, 0xe0, 0x0, r7}, [@IFA_BROADCAST={0x8, 0x4, @private=0xa010101}, @IFA_BROADCAST={0x8, 0x4, @local}, @IFA_FLAGS={0x8, 0x8, 0x40}, @IFA_LABEL={0x14, 0x3, 'veth0_macvtap\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x7, 0x62, 0x5, 0x8}}, @IFA_FLAGS={0x8, 0x8, 0x10}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 20:33:14 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000000)) 20:33:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) 20:33:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r4, 0x1ff}}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:14 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) 20:33:14 executing program 1: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:14 executing program 4: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000280)="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") r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000000)) 20:33:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:15 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, 0x0) 20:33:15 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8280, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x180, 0x0) write$binfmt_script(r1, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'eth0}vboxnet0]:/nodev(%wlan0'}], 0xa, "8e230d23ac6dd8ffccdcf4c9d4b32f2e91ff7ad2f0daa6d858aeaf2515f66b41ec0933abcc6f080c5587b915dcbb9da43c9c9db5918a8e89"}, 0x60) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0xd4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, r0, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000000c0)={0x8}) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @empty, 0x1, 0x1, [@private=0xa010100]}, 0x14) shutdown(r4, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x37, &(0x7f0000000340)=ANY=[@ANYBLOB="320d000000000000c204ffffffff0401040109000000000000000000c910fe88000000000000000000000000010107200000000106030400060000000000000002000000000000003a030000000000000401010720000000020605740006000000000000b7a0a5b030aa13dce5ff1a00060000000000000005000000000000000000002af54201b9d43a2d310f1fd954cb6fdb590515b157fe88c1acb4a05ffff91bd35b84ae837f7b2581384b72ce6aece6989c93dd7ecdcb9a942c"], 0x78) socket$inet_dccp(0x2, 0x6, 0x0) 20:33:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0xce, 0x7, 0x1, 0xfffffffffffffffc, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000940)=[{{&(0x7f00000003c0)=@can, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000bc0)=""/106, 0x6a}, 0xfffff64a}, {{&(0x7f0000000ec0)=@tipc=@id, 0x80, 0x0, 0x0, &(0x7f0000002440)=""/79, 0x4f}, 0x2}, {{0x0, 0x0, &(0x7f0000004940)=[{&(0x7f0000004880)=""/159, 0x9f}], 0x1, &(0x7f0000004980)=""/75, 0x4b}, 0x7e}, {{&(0x7f0000000180)=@sco, 0x80, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/116, 0x74}, {&(0x7f0000000340)=""/5, 0x5}, {&(0x7f0000000440)=""/106, 0x6a}, {&(0x7f00000004c0)=""/160, 0xa0}, {&(0x7f00000006c0)=""/177, 0xb1}, {&(0x7f0000000380)=""/29, 0x1d}, {&(0x7f0000000780)=""/168, 0xa8}], 0x7, &(0x7f00000008c0)=""/99, 0x63}, 0x3}], 0x4, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x41, 0x8001, 0xfd, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x1}, 0x4901, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x2000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0xa) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$inet(r4, &(0x7f00000010c0)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @initdev}, 0x10, 0x0, 0x0, &(0x7f0000005480)=ANY=[@ANYBLOB="1800000000000000ff06004a60ebef2c478a8eecec9c4c7c70e96d508f07fe3b04dc8cb2acd37913b1f73ab71d6dc45954a82057877482992d4182e0000002fec513d12adb64fe868b17ee10d2d603892ae97f2c182307050491e76079b7e99a6e319aad462f9691ba629a777fb5d0a0583b7ec4e36f08d215c2de67708a460a8a29bee41e9ec39b4bc291b928ef9f1b12e68f74ab829bfab487da47081184bf0d92f72e567b07f8112d75f25cfa60b42e5eafe40debd93f5c8843542ce87ccd81b56a7ae49a9d9c05298ef7f9267d128ce11df000d9fa45e8a8dcbd98d41df16b4ebd66464d1e7f66e11a5463afc56cd9c3ffa277233a378e5cbdf9d18aa6a0eee8e60f2627681241231afcffab6b767130120b75215596d1bc4fb6849874fabbd14fdf723522e65fa0c1c1598d101b737b6dd68457b0b8a034dd0c734ce5e7aab97628569897d804986838614b32e2eb83b4cd080277abb4862824672d7ef659a3c2b217d76be42e595d751d8dde26cecba021e627df1e13015900953b245c3db57fd510dffc9516e6456c9560e298785fe0f9d862f8000000000000b7f90b24204ee593370bd8b862765e1c604f179187f6113b17a1a679fea2c9a8f3ec78f787a020fcdc91fc1b4dc2394b3dc3bf0100000000000000dd5f4baa63f744982ebd6d1a0036e8231e1e5b2d00d4d30be7a1733342ce4e8deafa2a6ca643ed1be45c869a8b4b69098fd7ad188d8b50b1eb282db29052c8463c09d239ee2aa3a97a170f7f3afa435df3b9b5d1be8527b9acdc7dea2c69bae4d8115fb6a7bc72e15045dd1d4654ba4b15881c90fffffffb36cacd0f0a25955257cac2fbe3b066a59b27df5fb6e122534b2cc6c8c298eaff0149aefd6cc9e559c485b2e9943ffb3414d8713f19009cd2d1c37f68137392f85fd6d5791a8a3c2ac7c6e02662b86b577ceef4dcece714c2d5e781774d1aa0ff4e0a6dac6b7be3983a7de4c5d2b6a0124ab2cb83d197059dff5229a6a8ed66ad4ab6fe55a0319ab26e8049f1aec539292912f1d52cffad48cc180c8b082a78496675fb70e50d5184e704d5195a3a487c76145ffde841c0153a5ddbf52a70a63923b5868e5a433969d359a99965f6cbfbb602e59143a21cf502d524dd1a0000000000000000009adae503c1a2c4f35964f1bc738adf9bff6c2edd8ba60be9f2dd79a0ba73b74c0ebb2d779856e31ab8083702be8173192f38f8edeaf1b05274f84576582d576828025a99d84eea9bb538e4eb5992028044f824137587056b928186aaf2114010d9c4bf39cd87997208c32b1df1a2ed39562630060c603fb5ceeb5f93fbe8e77345f7b9268af4550f1f6cbbd22c13dbdc602b9f260ec062bff3f304c84e61ad23866172029c0d1ccdd3ad03b153b123486fd647189a178b1af0abdce96c20cc1d1d680354468840617209c4e789465711059d2495a9b11be564cb9616627812d89226e66c1620e861db9f8e806e48ddf3bdcf806c1709f64174a96d631631d783180bc2a3c14d5536e036b4f038f0e4fbe489096174aa1cb8f71599968df5e0173c4beeeb43dda481efd4efdff9f2bd2a142b8b1532b4a38eb1db00333662a994f76c4541b9ab5d638f40fc044cc901eb495746382f4a79153e59a423d070d5f148cb1075adaa529d8ea94586d40cdfdcc4b8145ebac24a19dae096ef068f4620c0955058f6eb8f51b3337d8c3c1b3d64"], 0x18}}], 0x1b1, 0x0) socket$inet(0x2, 0x0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3f) 20:33:15 executing program 1: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000015c0)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=0x0, @ANYBLOB="040000000000000008000500", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000100000000002000010000000000106bb8d68650f461b64187bd84ac40b643"], 0x7c, 0x1) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001b80)=ANY=[@ANYBLOB="280000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r1, @ANYRES32=r2], 0x48, 0x4c000}], 0x2, 0x4004090) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setresgid(0x0, 0x0, r3) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [{0x8, 0x5, r2}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x4}, {}, {0x8, 0x3, r3}, {0x8, 0x6, r2}, {0x8, 0x0, r4}, {0x8, 0x0, r2}], {0x10, 0x1}, {0x20, 0x1}}, 0x7c, 0x1) r5 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0xfffffffffffffe9f, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001480)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=r6], 0x48, 0x4c000}], 0x2, 0x4004090) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setresgid(0x0, 0x0, r7) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [{0x8, 0x5, r6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x4}, {}, {0x8, 0x3, r7}, {0x8, 0x6, r6}, {0x8, 0x0, r8}, {0x8, 0x0, r6}], {0x10, 0x1}, {0x20, 0x1}}, 0x7c, 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000001440)='system.posix_acl_access\x00', &(0x7f0000001500)={{}, {}, [{0x2, 0x3cbfa9f82251d4bb}, {}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x3}, {0x8, 0x0, r0}, {0x8, 0x0, 0xee00}, {0x8, 0x4, r2}, {0x8, 0x5, r6}], {0x10, 0x5}, {0x20, 0x1}}, 0x84, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f00000000000000000005bb290000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="3e6cb1d99d95b0f908473ffdedc014879fee1c5545f74ddfcd48b1e4e55c94a006c175fb1973190d69ed4bc61cf6b4599f87dda48f14c078fa7f617cf9e37265f2af0490c6ed1dbfd61deaf94af7170dd7f44ce5e7d2f9d1a1ba34c55e790a6d5a8a41aa1a2235a11ef31848735159843b5a1307a90132d70ed905c39280268643eb839d557ca107f67c7587fdd56015f443b19015a35bce4a4c5ee465fb10874ca1d6833ceba0c3875b336f3cbdc555b6f90aabb3a984e577405fa7a5ed1c064602036e33595a1e10560fd0a8e1c2", 0xcf, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0xff}, {&(0x7f00000000c0)="1dbd7efe7276fa963919e415ee2a987e541991782324bf8c2c5e483536164fc738dd2b5c2a29e1f1290f2202c5b8a279c7d2b9f0ce09fd43376b87b660ca0e8f1f0aa7e90bca", 0x46, 0x2}], 0x805020, &(0x7f0000001340)={[{@nodiscard='nodiscard'}, {@stripe={'stripe', 0x3d, 0x2}}, {@dax='dax'}, {@orlov='orlov'}, {@mblk_io_submit='mblk_io_submit'}, {@errors_continue='errors=continue'}, {@noinit_itable='noinit_itable'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, '...'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@pcr={'pcr', 0x3d, 0x2c}}]}) 20:33:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:15 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:15 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) [ 299.788800] ldm_validate_privheads(): Disk read failed. [ 299.800866] Dev loop1: unable to read RDB block 1 [ 299.806197] loop1: unable to read partition table [ 299.814955] loop1: partition table beyond EOD, truncated [ 299.827095] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 20:33:15 executing program 1: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000015c0)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=0x0, @ANYBLOB="040000000000000008000500", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000100000000002000010000000000106bb8d68650f461b64187bd84ac40b643"], 0x7c, 0x1) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001b80)=ANY=[@ANYBLOB="280000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r1, @ANYRES32=r2], 0x48, 0x4c000}], 0x2, 0x4004090) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setresgid(0x0, 0x0, r3) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [{0x8, 0x5, r2}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x4}, {}, {0x8, 0x3, r3}, {0x8, 0x6, r2}, {0x8, 0x0, r4}, {0x8, 0x0, r2}], {0x10, 0x1}, {0x20, 0x1}}, 0x7c, 0x1) r5 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0xfffffffffffffe9f, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001480)=ANY=[@ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=r6], 0x48, 0x4c000}], 0x2, 0x4004090) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setresgid(0x0, 0x0, r7) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1}], {}, [{0x8, 0x5, r6}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x4}, {}, {0x8, 0x3, r7}, {0x8, 0x6, r6}, {0x8, 0x0, r8}, {0x8, 0x0, r6}], {0x10, 0x1}, {0x20, 0x1}}, 0x7c, 0x1) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000001440)='system.posix_acl_access\x00', &(0x7f0000001500)={{}, {}, [{0x2, 0x3cbfa9f82251d4bb}, {}], {0x4, 0x2}, [{0x8, 0x1}, {0x8, 0x6}, {0x8, 0x4}, {0x8, 0x2}, {0x8, 0x6}, {0x8, 0x3}, {0x8, 0x0, r0}, {0x8, 0x0, 0xee00}, {0x8, 0x4, r2}, {0x8, 0x5, r6}], {0x10, 0x5}, {0x20, 0x1}}, 0x84, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f00000000000000000005bb290000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x3, &(0x7f0000000180)=[{&(0x7f0000000240)="3e6cb1d99d95b0f908473ffdedc014879fee1c5545f74ddfcd48b1e4e55c94a006c175fb1973190d69ed4bc61cf6b4599f87dda48f14c078fa7f617cf9e37265f2af0490c6ed1dbfd61deaf94af7170dd7f44ce5e7d2f9d1a1ba34c55e790a6d5a8a41aa1a2235a11ef31848735159843b5a1307a90132d70ed905c39280268643eb839d557ca107f67c7587fdd56015f443b19015a35bce4a4c5ee465fb10874ca1d6833ceba0c3875b336f3cbdc555b6f90aabb3a984e577405fa7a5ed1c064602036e33595a1e10560fd0a8e1c2", 0xcf, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0xff}, {&(0x7f00000000c0)="1dbd7efe7276fa963919e415ee2a987e541991782324bf8c2c5e483536164fc738dd2b5c2a29e1f1290f2202c5b8a279c7d2b9f0ce09fd43376b87b660ca0e8f1f0aa7e90bca", 0x46, 0x2}], 0x805020, &(0x7f0000001340)={[{@nodiscard='nodiscard'}, {@stripe={'stripe', 0x3d, 0x2}}, {@dax='dax'}, {@orlov='orlov'}, {@mblk_io_submit='mblk_io_submit'}, {@errors_continue='errors=continue'}, {@noinit_itable='noinit_itable'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, '...'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@pcr={'pcr', 0x3d, 0x2c}}]}) 20:33:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x50d400) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x140, 0x280, 0x300, 0x401, 0x7, 0x4, 0x0, {0x0, 0xcac8}, {0x1, 0x2}, {0xffffffff, 0x8}, {0x1ff, 0x147, 0x1}, 0x2, 0x0, 0xff, 0x8, 0x1, 0xffffffa9, 0x6, 0x96, 0x1ff, 0x101, 0x3e, 0xba, 0x13, 0x0, 0x2, 0xb}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0xc840, 0x0, 0x0) accept4$rose(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d7463702c09000000000000003030303030303030303030050000000000000019ea337c646532322c000000003d4d4f44e7d2efecb23382d64b", @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB="45c3210bf26b9705bee8"]) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x122) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 20:33:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) ioctl$KVM_GET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, &(0x7f0000000200)={0x0, 0x5, 0x0, &(0x7f00000001c0)=0xfffffffffffffffe}) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:15 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) [ 300.298000] ldm_validate_privheads(): Disk read failed. [ 300.303571] Dev loop1: unable to read RDB block 1 [ 300.326499] loop1: unable to read partition table 20:33:15 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_mreqsrc(r5, 0x0, 0x26, &(0x7f0000000500)={@empty, @rand_addr=0x64010101, @private=0xa010102}, 0xc) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001b80)=ANY=[@ANYBLOB="280000000100"/15, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7], 0x48, 0x4c000}], 0x2, 0x4004090) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setresgid(0x0, 0x0, r9) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x2}, [{0x2, 0x1}, {0x2, 0x2}, {0x2, 0xc, r10}, {0x2, 0x1, r8}, {}], {}, [{0x8, 0x5, r7}, {0x8, 0x2}, {0x8, 0x3}, {0x8, 0x2}, {0x8, 0x4}, {}, {0x8, 0x3, r9}, {0x8, 0x6, r7}, {0x8, 0x0, r11}, {0x8, 0x0, r7}], {0x10, 0x1}, {0x20, 0x1}}, 0x9c, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3044031, &(0x7f0000000600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_id=', @ANYRESDEC=r7, @ANYBLOB="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"]) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000004c0)={'ip_vti0\x00', {0x2, 0x4e21, @rand_addr=0x64010101}}) [ 300.345883] loop1: partition table beyond EOD, truncated [ 300.380581] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 300.395754] 9pnet: p9_fd_create_tcp (14061): problem connecting socket to 127.0.0.1 20:33:16 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x12300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x5, 0xfffffffd) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) ustat(0x5, &(0x7f0000000000)) 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x0, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) dup(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sendmmsg$inet(r1, &(0x7f0000005240)=[{{0x0, 0xffffff7f, 0x0}}], 0x300, 0x401eb94) 20:33:16 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 300.576589] 9pnet: p9_fd_create_tcp (14068): problem connecting socket to 127.0.0.1 [ 300.605920] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 20:33:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x50d400) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000340)={0x0, 0x140, 0x280, 0x300, 0x401, 0x7, 0x4, 0x0, {0x0, 0xcac8}, {0x1, 0x2}, {0xffffffff, 0x8}, {0x1ff, 0x147, 0x1}, 0x2, 0x0, 0xff, 0x8, 0x1, 0xffffffa9, 0x6, 0x96, 0x1ff, 0x101, 0x3e, 0xba, 0x13, 0x0, 0x2, 0xb}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = accept(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x0, 0xc840, 0x0, 0x0) accept4$rose(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d7463702c09000000000000003030303030303030303030050000000000000019ea337c646532322c000000003d4d4f44e7d2efecb23382d64b", @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB="45c3210bf26b9705bee8"]) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x122) creat(&(0x7f0000000080)='./bus/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 20:33:16 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) 20:33:16 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9}, r0, 0x0, r2, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r4, 0x2289, &(0x7f0000000040)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r5, 0x0) 20:33:16 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) [ 300.892138] FAT-fs (loop1): bogus number of reserved sectors [ 300.933028] FAT-fs (loop1): Can't find a valid FAT filesystem 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x0, 0x1ff, 0x40000, 0x7}) [ 300.992224] 9pnet: p9_fd_create_tcp (14093): problem connecting socket to 127.0.0.1 20:33:16 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:16 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 20:33:16 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 20:33:17 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 20:33:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x0, 0x40000, 0x7}) 20:33:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:17 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) signalfd4(r1, &(0x7f0000000180)={[0x8]}, 0x8, 0x80800) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x3, 0x70, 0x40, 0xdd, 0x80, 0xdc, 0x0, 0x5, 0x8000c, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0xffff, 0x7ff}, 0x4239, 0x1, 0x42, 0x3, 0x7f, 0x100, 0x7f}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000001640)=0xe8) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x9c}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001880)={&(0x7f0000001680)={0x200, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8}, {0x4}}, {{0x8}, {0x50, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x8001, 0x7, 0x5, 0x2}, {0x9, 0x7f, 0x81, 0x1}, {0x20, 0x99, 0x1f, 0x6}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r5}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}]}}]}, 0x200}, 0x1, 0x0, 0x0, 0x801}, 0x200000d1) 20:33:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) splice(r1, 0x0, r0, 0x0, 0x20000038, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="900200000000000001b06c31222026933318bff892ec1c6191a1fe2a741701a13c6d97b05c2866ae1d369c637c74e2b1ec693de1e8579d2cdf0df552ab33ce77391367a25e826032ce1c5d5104fc64156b0ea87c08e9f747f9fa894274f9998747c23eb3c9c5f919c7eb05a6055f9c57c63c13a54b3dce87f01d290cdc253ace960bfe5bf92f87e6f4e3659aa4000096d73b0a3854e2d849a2d1d1a13a8d60dc810f5f8f9587447e2342a6f49a0e58f0c2825757c0a45faf710f7b7d2347e846bd4de485b693595fa997fdc17ac1336b5c76bc03df5178b60900b5b02e3b331adcca4d42d617667038d0552bbf7c1b57e18374db6523b650e7f4978d2a1b93398bf259c913e0d3e2df037d5ae90659ef6ba3448efcba"], 0x290) 20:33:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) 20:33:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0xfffffffd, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}, 0x4000}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x4}, 0x0) getpid() perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x40000000011, r1, 0x6980b000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) 20:33:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) 20:33:17 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000000, 0x40010, r0, 0xaf2b2000) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000000c0)={0xfffffff7, {{0xa, 0x4e21, 0x200, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8}}}, 0x88) r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r3) 20:33:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x0, 0x7}) 20:33:17 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 20:33:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:17 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:18 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 20:33:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2c0000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x1000, 0x0, 0xff, 0x0, 0x192, 0x9}, &(0x7f0000000080)=0x20) 20:33:18 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:18 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 20:33:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200407fc, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) read(r1, &(0x7f0000000000)=""/42, 0x2a) 20:33:18 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:18 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 20:33:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r2, 0x0) 20:33:18 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:18 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9ae6}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:18 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000}) 20:33:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x6}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000000)={0x0, 0x32152737}) r4 = semget(0x1, 0x1, 0x100) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) mq_timedreceive(r3, &(0x7f00000001c0)=""/44, 0x2c, 0xffff, &(0x7f0000000280)={r5, r6+60000000}) semctl$SETVAL(r4, 0x4, 0x10, &(0x7f0000000040)=0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) fsetxattr$trusted_overlay_opaque(r7, &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r8 = socket$inet(0x2, 0xa, 0xffff0008) sendto$inet(r8, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r8, 0x0) 20:33:18 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:18 executing program 0 (fault-call:19 fault-nth:0): r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 303.061368] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 303.121846] FAULT_INJECTION: forcing a failure. [ 303.121846] name failslab, interval 1, probability 0, space 0, times 1 [ 303.170680] CPU: 1 PID: 14257 Comm: syz-executor.0 Not tainted 4.14.180-syzkaller #0 [ 303.178598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.187975] Call Trace: [ 303.190684] dump_stack+0x13e/0x194 [ 303.194424] should_fail.cold+0x10a/0x14b [ 303.198683] should_failslab+0xd6/0x130 [ 303.202674] kmem_cache_alloc_trace+0x2db/0x7b0 [ 303.207382] ? strncpy+0x35/0xc0 [ 303.210824] do_blk_trace_setup+0x11e/0xad0 [ 303.215181] blk_trace_setup+0xa3/0x120 [ 303.219169] ? do_blk_trace_setup+0xad0/0xad0 [ 303.223726] ? retint_kernel+0x2d/0x2d [ 303.227647] ? sg_ioctl+0x243/0x2620 [ 303.231375] sg_ioctl+0x2f9/0x2620 [ 303.234971] ? check_preemption_disabled+0x35/0x240 [ 303.239994] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 303.244944] ? retint_kernel+0x2d/0x2d [ 303.248889] ? trace_hardirqs_on_caller+0x3f6/0x590 [ 303.253916] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 303.258580] do_vfs_ioctl+0x75a/0xfe0 [ 303.262387] ? check_preemption_disabled+0x35/0x240 [ 303.267412] ? ioctl_preallocate+0x1a0/0x1a0 [ 303.271994] ? security_file_ioctl+0x83/0xb0 [ 303.276435] ? __sanitizer_cov_trace_pc+0x3d/0x50 [ 303.281290] ? security_file_ioctl+0x83/0xb0 [ 303.285709] SyS_ioctl+0x7f/0xb0 [ 303.289081] ? do_vfs_ioctl+0xfe0/0xfe0 [ 303.293069] do_syscall_64+0x1d5/0x640 [ 303.296973] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 303.302166] RIP: 0033:0x45ca29 [ 303.305356] RSP: 002b:00007febf822ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.313067] RAX: ffffffffffffffda RBX: 00000000004e18c0 RCX: 000000000045ca29 20:33:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) [ 303.320518] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 303.328229] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 303.335506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 303.343584] R13: 000000000000022a R14: 00000000004c4706 R15: 00007febf822b6d4 20:33:19 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, r5, 0x1}, 0x28}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x200, 0x70bd2d, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8001}, 0x48000) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, &(0x7f0000000300)={0x88d4, {{0xa, 0x4e21, 0x82, @remote, 0x3}}, 0x0, 0x3, [{{0xa, 0x4e21, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x1}}, {{0xa, 0x4e21, 0x6, @local, 0xfff}}, {{0xa, 0x4e21, 0x401, @local, 0xe00}}]}, 0x210) sendmsg$nl_crypto(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@delrng={0x10, 0x14, 0x400, 0x70bd2d, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4c004}, 0x804) write$binfmt_elf64(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x8) fadvise64(r0, 0xffffffffffffffff, 0x9, 0x4) 20:33:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:19 executing program 3: r0 = getpid() r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8001) mq_notify(r2, &(0x7f0000000180)={0x0, 0x2d, 0x1, @tid=r0}) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x2, 0x0, 0x0, 0x0, 0x3, 0xb5202, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd7b}, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x1) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @private=0xa010102}, 0x10) shutdown(r4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000080)={0x0, 0xc, 0x4, 0x10000, 0x5, {}, {0x2, 0x8, 0x81, 0x4, 0x5, 0x7f, "fc41672a"}, 0x200, 0x4, @fd=r6, 0x1f, 0x0, r3}) ioctl$SG_SET_DEBUG(r7, 0x227e, &(0x7f0000000180)=0x1) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000040)={0x2, 0x112, @value=0x3}) syz_init_net_socket$x25(0x9, 0x5, 0x0) 20:33:19 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) msgget$private(0x0, 0x52) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x9c}}, 0x0) pivot_root(&(0x7f0000001b00)='.\x00', &(0x7f0000001b40)='./file1\x00') sendmmsg(r0, &(0x7f0000000c40)=[{{&(0x7f00000000c0)=@caif=@rfm={0x25, 0x80000001, "2bcdc3946faf5ddb88a21776beea7406"}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000180)="fadd7c1bca08a5a010c1de049dd423bf72a47a7ad3732894f338e0a8502d4351c9c068b83b80ed80c107588da57b121f6205a628b08c680b825755824274a388aa75a45d10959db4c9bb8b76313e62b60b2f5b46ff18798bdebbbbbd3623956c03e0b049", 0x64}, {&(0x7f00000004c0)="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", 0xfa}, {&(0x7f00000005c0)="1f54753cd0e5ebe1a550e48508874df28637ace9ed366408c804a08a59617b7bc306c47e7fc0a8c63f857dd3d543b1d3839a1469f829c6c1364f", 0x3a}, {&(0x7f0000000b40)="13befd36c718b41e2d4b13bff6a91c9b82dd9efbeaad913746ee4999cf3ba2ffaf82ae724806c7c780e998058ddddb77f2bbc9d81bff9dfa10cb2ab0dcd4d51764e7dbd78788dfb5a4f1c67b5f178bdd55c43493f8cb481ea092ff56d1001640bd4381060963231ba5737ad0d2f276100afbd4464ab4488952e4dd3982c77658eca2f9529798706314cf9d", 0x8b}], 0x4, &(0x7f0000000640)=[{0xa8, 0x88, 0x6, "a7183416cd0d6a937c77acd202f30b606985e11219e365641d87e190cf4b0c0fe67d92236fafc7e1dd7c043f2da4be0391e299ea3c60a89d3fed868df640b4468c1943e086c77ca3a3d8b51d8d6ab19c771873935b79256f2b3011a4bb0bbd213ff4736da7667041140217dc78d936067b2ca44f52efb8b7d5e8cd4b761e44399199bc706ccb577aa6c102e2b253e122cb4691"}, {0xd0, 0x5, 0x49d5, "03c0518fc457aa1838ab97072dc1512cfd8f398f34bd5875e5cbe4baad47e86974b18d3c0ee8a1ad46713f887374b86ef145c30984da23038f008a2b072b1147d6d542ea3ae20e27487aa0c268204fde25839ff7ff990551b1a218b88183310e4a997ec9caaea11aaebeb30d9572220e9f5c364c5f091d3a20df218c74270aab4802dee49e92943dce41e493af5492c2d7ce8d6f1ca8bd3e81ee30b96daa81e4183e34e5429ff57ba66eda3e568903fcb60eb78e89fae67db77d"}], 0x178}}, {{&(0x7f00000007c0)=@sco={0x1f, @fixed={[], 0x11}}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000840)="966125cedcb7480db14d913dfc1960a9d5394cb0d437c13903a5c090ccf38c75ca7777bca60a509ddb1d04d1cfb67b4cf615c90fcf73942f63e9a72900382b4370deabc70579dfd9f4587d1dd5218b56661be88c2528e8646d9a078d2206b878ada3009809c902ec785273659ba93d1d7dbb5205e19aea407d84d06a4ef355c8bac817d7bacb5eb6505e30593d3da4859fbd73845c001316e3399002da56bb98dd370df7bf01f3367a2319af34aaa1fcb13a44425c0f450465ff500093779c9b5ae49239a58a6bf0c81d6a1c6569818014672dc4bd8bec9e8fc4be622905103a573a5f9d395fa5abe64c19596d", 0xed}, {&(0x7f0000000940)="ea51eb298bf60717783c6f9b14c9e31c9b2934b38d19dfaae25bd608fe6aa7a3ca126664fc81764b9f93e67b7a5cc2fde8c2c0d9a614eb07c51d", 0x3a}, {&(0x7f0000000980)="946f2f19a32c954a11bcec15f390972c49dceb7727276d", 0x17}], 0x3}}], 0x2, 0xc800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000040)={0xffff, 0x1ff}) ioctl$KVM_SET_FPU(r4, 0x41a0ae8d, &(0x7f0000000300)={[], 0xedd, 0x1, 0x3, 0x0, 0x78e9, 0x6000, 0x100000, [], 0x20}) syz_read_part_table(0x0, 0x1d4, &(0x7f0000000200)=[{&(0x7f0000000080)="030005000314af00031400000000000000000f0000000000000000000500000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) setxattr$trusted_overlay_origin(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='trusted.overlay.origin\x00', &(0x7f0000000b00)='y\x00', 0x2, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup(r5) r6 = dup2(r5, 0xffffffffffffffff) ioctl$EVIOCGVERSION(r6, 0x80044501, &(0x7f0000000240)=""/164) 20:33:19 executing program 3: r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@empty, @loopback}, &(0x7f0000000040)=0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) 20:33:19 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:19 executing program 0 (fault-call:19 fault-nth:1): r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:19 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f00000000c0)='./bus/file0\x00', 0x0, 0x94) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8001) mq_notify(r2, &(0x7f0000000180)={0x0, 0x2c, 0x2, @tid=r0}) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x8001) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x8000000004000000, 0xffffffffffffffff, 0x0) r6 = socket$inet(0x2, 0x6, 0x1) sendto$inet(r6, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @local}, 0x10) shutdown(r6, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) 20:33:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 303.928519] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 303.948827] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 303.973769] loop4: p2 < > 20:33:19 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0xfe, 0x0, 0x0, 0x536d9511, 0x3800a, 0xd3d851e8b9dd0f6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xfffffffffffbffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="08000100c274aa07de650200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="13d33aca8e3a3e2c39505d1cce24fd72ab2c0ffb2895a6b3b1baba1e0392180bb0604426e02a414d168305d66062a2776b015f4d8e06539b187d17f166ae6f5fc3d375d76aed5f57e69a40d627eb5686d04e8d86890963f7440ea28d16672e9943d1f8792c6ff25f02f5d849bf72d68e7b16d54707317ac96a131b032abd11564b65a1bce3bded63c8d39de2a10c7ed991be3da2d3aa46f0c626c508c71acb5a80a2dad67e5c6b10abf852f8639718704b58ba1eae3ebffcd1a066"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 304.013765] QAT: Invalid ioctl 20:33:19 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:19 executing program 4: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x0, &(0x7f0000000100)) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000380)=""/91, &(0x7f0000000400)=0x5b) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_REINJECT_CONTROL(r4, 0xae71, &(0x7f0000000c00)={0xfa}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x1, @private1={0xfc, 0x1, [], 0x1}, 0x675, 0x2}, 0x80, &(0x7f0000000600)=[{&(0x7f00000001c0)="95422fb0071ff643fd428283af163b798347dd0901640191a6f7e1c5510b77741b7d3cd86198f6b97140170cad9e6c8fb279c5c41967e7761278e500c4c256b4a4f477c622ceea587b8b3fd4365db96248d41956546cf33409daf58c5fc33704d9756d957d8fa91015", 0x69}, {&(0x7f0000000240)="9f449d531d16ff823622556593286c33604598efb1de4c630e5e1356cffbd8c5a90cabfe4896cbabaee08812b2e6df384c8c01fd8e10427fd02cccb83e1fbbed2c542e46d6439c29563831bad0263534e5d6730cb88cf61befa8e6ef9086aa95c3cea2", 0x63}, {&(0x7f00000002c0)="a200d4cdfdb83b40fdba5835435ce40d2da515e9c37a1dcd495a13761c1978757b4111247371199445724be1de44391dacfd6e301db6d9cab61a0ae02d93519990c191497edc4643d8f700649860d863bc45b5216f2317dd9f6740c6bbdf757092e108e3862bdbda206613fc93992fc1f71c35487edb0a0854ef27f147280b4a825008c0a8537950eab0a32e9ebb3123f8f84020d5", 0x95}, {&(0x7f0000000e40)="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", 0x28b}, {&(0x7f0000000480)="ff04a595fbd499c6dfa722020e2dfa5c42b27c5d70bdabaa900257d86198019fb8009b42d395e830c31ab2ebcd8c5878f62d7a972f1cd391b83e3feed587dff12f0b43992758e12390b09a6beb1015a425fdc8ee1bfc43d937691995976fa2911f8a5e79cf805dfc752c047c8c47c3", 0x6f}, {&(0x7f0000000c40)="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", 0x132}, {&(0x7f0000000ac0)="359e31e9bb2146e7b461d7e9fce735cdbb9d557ac16c418a68a5e6c1890e3a0fd5fc49e622ca0ad80481e8adb115005a49db4f37f279e1c6e0115bcea162077d2e46ca1e1e3920d07f43a70718e8b15b0c8d2d5ce474365cb00c0de7bf2a485fabdd7055a916338104ee1b2437a4bb500cdb13f53a582e1e329ce47674ccf88fdc4a5344cd2b0c83c88e11a1bbe9514300e881dde9b74055e704c10f055302ae9e3673d6011d02fe32a7f3dd20167ce1edc541e594c3a5342798826ed35bb529872e1ba4a0c4cd2d0882697c317d09ae81f6d241c36357af8a", 0xd9}], 0x7, &(0x7f0000000680)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x18}, 0x6) sendmmsg(r2, &(0x7f0000000080), 0x4ff, 0x0) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000080)={0x0, 0x0, "48e10edbf70e206d73862f996f14a7e715f4629cddd24f51e26767a1c3848176", 0x0, 0x0, 0x0, 0x3, 0x102}) 20:33:19 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0xa, 0x6) close(r2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80801, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f00000000c0)={0x8, 0x7}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141140, 0x0) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_CTRL(r8, 0xc008561c, &(0x7f0000000140)={0x1, 0x9}) 20:33:19 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8001) mq_notify(r2, &(0x7f0000000180)={0x0, 0x2c, 0x2, @tid=r0}) perf_event_open(&(0x7f0000000100)={0x0, 0x82, 0xd4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x30021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r3, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x664d42, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000080)=0x8) 20:33:19 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:19 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'tunl0\x00'}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r2, 0x0) 20:33:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000080)={0x0, @dev={0xac, 0x14, 0x14, 0x3d}, 0x4e24, 0x3, 'wrr\x00', 0x15, 0xffffffff}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) shutdown(r0, 0x0) 20:33:20 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c0000001100319b8f4ecb41b9ed000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000006c00128009000100766c616e000000005c0002800600010000000000040003804c0003800c000100ffffffff090000000c0001007f000000020000000c00010002000000070000000c00010000000000030000000c00010009000000fc0200000c00010004000000fabffffd08000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3, @ANYBLOB], 0x9c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000280)={0x3f}, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r4, 0x408c5333, &(0x7f0000000180)={0x4, 0x7f, 0x0, 'queue0\x00', 0xd}) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f0000000000)="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", 0xfe) 20:33:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYRES32=r2, @ANYRES32=r5, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x24001, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0xd, 0x3, 0x4, 0xff, 0x3}) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 305.003166] audit: type=1326 audit(1589834000.648:63): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14395 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0x0 20:33:20 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000a00)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082ab57000fddbdf2525000000080001007063690011000200303030d5326bf0bdc0d7dc1b0c3a303a30303a313046405e89beb21b4716cafb3b9a2e300000000008008b00bef5d88770f547b3057040e73322f92c6e221e066ef942de2690e9f982711786588ff970522964b7ba6a39f74cf1b978e3b74b9760adc4ae7034c8bf2e8d6fd626a562b51c33ef4324b81e6ac966094c54ca34614921c99dd372a613a3efab4a52f943c6deb37fc88286abe2d30028d77879e01401153338b143d992530736bd95beddb03daefdfc2f6e50d75b4dc8235b51e963e6268cdac9b1bf80423850", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="80f0e046c92c77341b764eea1a3777c54c6704a6162e096f52920a836c39b2adb291f2e4db059439a2a8e645544a7568a13d09e85a6bcb8fafa972b74f530ee2400ba1050d2641d47cc10c34061b648aa437fddd33b80efe2c9651aa27af90c522c6e00c852c146fe4267a0246adaee0a1099ad8b23c7ff7ab8b2a9b87560785bd6bcbb8d46678937aa23a9aeedb14faa5df3fdeabb994a6d3e19e5461eb2a98a6d4c6d5c5e44d069c386116416cd42afc487242aeb44bedf824385079ada6229409bce72f28ce516bc191212a7e95c4f210d58f9205c6871e6136dccc4745f94f1156c73997fcab77d4b0f219e5c6de97bb5dfa2f7b87c26eeaba8bdb5263a4491748aa3a67ab588a5ceea7ee8d29280fa6a034"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 4: getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f00000001c0)=[{0x4, 0x1, 0x1, 0x5e}]}, 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x8, 0x9, 0x100009, 0x5, 0xfffffffffffffffc, 0xd2}, 0x0) r4 = socket$inet6(0xa, 0xa, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x12) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x8001) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x80000000000000, 0x4}, r3, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0xd) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 20:33:20 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000940f26f7edabec2fce1bceba6bfa8cb272717c7ebe718161a785eff395d72110014aa5d9c0a34b93a8a9b7b3088b78072735a5355c43c43baecf63c5999d9b64c8b31d3e10ee5bb082905d85262ca86ce93a59f7b7be928032b1b0b3ec0c34256ff4ed72aa592a804f0036f4d9d6dbcdbb90bf8b86824ea824571c77199b3e39a539f32dc3718418c6f1880c91e83b3b54ae916d283b39d6fff0b54133797d860700", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x4}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:20 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:21 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:21 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYRES64=r2, @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d55e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRESOCT=r5, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r5, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:21 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 305.777805] audit: type=1326 audit(1589834001.428:64): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14395 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f86a code=0x0 20:33:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3521, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:21 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:21 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="ac45af21e99f5add421050806bde2f5ab83fb8398700115eef87a840c85eab5f581bd2ed1d8642f87a0ce5eeca51555e55711650e9f0efa3b4a83f7711db87763fd6734c4187dfe8dacfddf7f4b1501991adeee218f691afac83ee613ce8a29e365526bc2a8eb9d4061c7d0833cae965928c0bf262c588beefac233c4a6a134858cd4486d4de9d13c1b6b239971dade2138a218b83dca069852249275ba4e3"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) shutdown(r0, 0x0) 20:33:21 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYRES64=r2, @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d55e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRESOCT=r5, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r5, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:21 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:21 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000180)="af2ff347234d1e2f07a5ee8fdece8e6959dcecbca934dae0a5d674bfd06aefa25cda13083538f2dab3ed0d5c5e918bb5a25741d8c9c562557e9a1d8f7d72bfe33664ae70ed46d6f4cd2c75587313e88dccab529bb4ab6b59828abd85e3e22c80526d21b3884e7c0066e2815f756b7784dd0f1ed9a60ae3653620096342a5be4c810aa6273af68cd095a9b8215371a1f927b4663ebc18f229b0847496305457e05075677a1dc50f9c8788555f84b5d11bb0e53fb8fb78bdf676972f47da10713d0561e53e4da370867a2f5fa41c614d0b169d826e6f4246cb065bd73a64b68a8479218126565cd4f243", 0xe9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getpgrp(r3) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:21 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:22 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e2f66696c6530005be272c53faed1d63f8c6451e1bd0eaf14dbb2102669219c88cd264a8c55f412a8771c7caf8a8877d87706ac418f3d31e18a05222e7d39b66af76da6c3ea2d4b184fbaae842902f14aa05ea1b3675b31092e3c7c304b6573ff8f5a7a736288cfa14258240d26999a61f3d43d4ceac58b69dbe6306f0057108f7ebca96fdb92927175746b05e716642fc5ebc8163bbabc6aa088156c7301d27715fe58fafe78ab3cd1f7d74987a02d556167e851cbf3ae756000"/197], &(0x7f0000000340)='./file0\x00', 0x0, 0x41010, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@newtfilter={0x80, 0x2c, 0x800, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xa, 0x4}, {0xf, 0xfff1}, {0x1, 0x3}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x4}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0xda}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1c, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x6, 0xfff1}}, @TCA_FW_CLASSID={0x8, 0x1, {0x9, 0xf}}, @TCA_FW_MASK={0x8, 0x5, 0x4}]}}, @TCA_RATE={0x6, 0x5, {0x2, 0x80}}, @TCA_RATE={0x6, 0x5, {0x81, 0x3}}, @TCA_RATE={0x6, 0x5, {0x5c, 0x93}}, @TCA_RATE={0x6, 0x5, {0x81, 0x7f}}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008041}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2180b0, &(0x7f0000000100)={[{@barrier_val={'barrier'}}]}) 20:33:22 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xfffffffffffffde9) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:22 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000000)=0xfffffe01) 20:33:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 306.592271] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, [ 306.693396] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 20:33:22 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000000)={0x8, 0xa, 0x4, 0x800, 0x6, {0x77359400}, {0x5, 0x0, 0x3, 0x20, 0x7, 0x0, "3a31e094"}, 0x85, 0x1, @offset=0x5, 0x100, 0x0, r0}) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r5) r6 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="01000000", @ANYRES32=0x0], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x74, &(0x7f0000000000)={r7, 0x0, 0x10}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000080)={r7, 0x10001}, &(0x7f00000000c0)=0x8) 20:33:22 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e2f66696c6530005be272c53faed1d63f8c6451e1bd0eaf14dbb2102669219c88cd264a8c55f412a8771c7caf8a8877d87706ac418f3d31e18a05222e7d39b66af76da6c3ea2d4b184fbaae842902f14aa05ea1b3675b31092e3c7c304b6573ff8f5a7a736288cfa14258240d26999a61f3d43d4ceac58b69dbe6306f0057108f7ebca96fdb92927175746b05e716642fc5ebc8163bbabc6aa088156c7301d27715fe58fafe78ab3cd1f7d74987a02d556167e851cbf3ae756000"/197], &(0x7f0000000340)='./file0\x00', 0x0, 0x41010, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@newtfilter={0x80, 0x2c, 0x800, 0x70bd2c, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0xa, 0x4}, {0xf, 0xfff1}, {0x1, 0x3}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x4}}, @TCA_CHAIN={0x8, 0xb, 0x8}, @TCA_CHAIN={0x8, 0xb, 0xda}, @filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1c, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x6, 0xfff1}}, @TCA_FW_CLASSID={0x8, 0x1, {0x9, 0xf}}, @TCA_FW_MASK={0x8, 0x5, 0x4}]}}, @TCA_RATE={0x6, 0x5, {0x2, 0x80}}, @TCA_RATE={0x6, 0x5, {0x81, 0x3}}, @TCA_RATE={0x6, 0x5, {0x5c, 0x93}}, @TCA_RATE={0x6, 0x5, {0x81, 0x7f}}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008041}, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2180b0, &(0x7f0000000100)={[{@barrier_val={'barrier'}}]}) 20:33:22 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="bae1eb70ff19be0ad01673bac9598e45cd647b3e6156081046b30d60cd04fba245707bd184162dae2d"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r2) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 306.954441] EXT4-fs (sda1): re-mounted. Opts: barrier=0x0000000000000000, 20:33:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) accept4(r0, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000000)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000140)) 20:33:22 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:22 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) symlink(&(0x7f0000000000)='..', &(0x7f00000000c0)='./file0\x00') r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:23 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="0008d8f89f47fddbdf2525000000080001007063690011000200303030303a30303a008000002100000008008b02", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:23 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:23 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="a4020000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="00751a0e96f5e24a7277a26a3bdbea140494f99362588c388a74d979b463e9d6a366c0df9b8e5dae01212c6a88a2c2e44adcbf5d2270178cb17cc45ed9f57185f5b3c94157f06feae76749df3e9bde2145d535545fdfb14a9848cb01cdaa276373f0cb5a7ec18fafebf72f7b6d87604b5c0b28a7ccd3086fb79c6ba0d69bcd2c0dd20db482ced9acec9261b3b1800dc67be5acb70f991c9915f67c208b7222c78afee8e15a12d6a7d9e6c71b50e4526a875c9cce4cb66bf17e295eaaa73f00a743c3f65cf12ae14c6fed800b1a4a46e411db11bc7e357c971c4d26b25c42c5cd53ec"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) connect$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 20:33:23 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) gettid() r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000080)={0x8, 0x6, 0x4, 0x2000, 0x1, {}, {0x3, 0x8, 0x3, 0xa2, 0x4, 0xfd, "5e69f582"}, 0x3f, 0x4, @userptr=0x8, 0x10101, 0x0, r5}) write$sndseq(r6, &(0x7f0000000180)=[{0x3, 0xff, 0x9, 0x1, @time={0x1f}, {0x2, 0xa6}, {0x6, 0xc}, @time=@time={0xfff, 0x9}}, {0x81, 0x3, 0x5, 0x3, @time={0x6, 0x7ff}, {0x0, 0x7}, {0xff, 0x1f}, @addr={0x8, 0x7}}, {0x1, 0x51, 0x90, 0x3, @tick=0x9, {0x40, 0x63}, {0x1, 0x8}, @queue={0x81, {0x8, 0x7ff}}}, {0x20, 0x81, 0xfe, 0x1, @tick=0x80000000, {0x40}, {0x81, 0x9}, @addr={0x0, 0x40}}, {0x9, 0x2, 0x80, 0x1, @time={0x6, 0x61e4}, {0x20, 0x1}, {0x8, 0x9}, @queue={0xc1, {0x8000, 0x4a6}}}], 0x8c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYRES64, @ANYRESHEX], &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x0, 0x10}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:33:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:23 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a40d2500", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="08000100706369001100020030302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x101}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:24 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x4000000044882, 0x0) io_setup(0x101, &(0x7f00000004c0)=0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000001c0)={0x4, 0x0, 0xffff, 0x0, 0x2, 0x6583}) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x0, 0x0, "829837bc202455038becd4b7e7abdd2d4df24c"}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000000)={0x9080000000000000, 0x0, 0x0, 0x2, 0x1c}) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x1, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000}]) socket$inet6_sctp(0xa, 0x5, 0x84) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0xfffffecc) ioctl$SIOCPNGETOBJECT(r3, 0x89e0, &(0x7f0000000080)) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x2c, 0x2}) syz_open_procfs(0x0, &(0x7f0000000200)='net/stat\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000003c0)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000500)="2b5ad7942158ff6ab2354a2be7148c55fa674b6393abedf003c64a38a7c0e84c6cd39763ec16e7252093db3e0b827bcf691a108268700da35679f39c84f5d4747b650691381d1ec2b33344049eed91806f44a21aaefd882319327cc41687d7f20beed3ba60cf61a70ed383f44f3d573146965375ffa2ffb4aba9a42cfce0c147f22ed49f1f20b0053f149f92e6b0152ee84cbb87cd700fd1e7d364b5e12991c51113b4cbe7072fc57cd072aab7b6c2424d172397a659f2ef64907aa57f46e0d0b3b83fec19438fe534997add82765068039b748ad938ea91c758784ec29bbfa9efe8674313416ef816d9779e1e9092698dde9d4be56626407d171547a62acc417e78684e3a575d11e75f26cfef33434c5461b976a193dc1932dd897eb0b8c392d5381f7448944e2e07e7f23466e84aa6ecaaa91a53221724a6bb279199f2d5fe2cff22f13a9f498fabf78ff04aefe67a8aa566087fd0eb", 0xe2}, 0xffffffffffffffa5) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}, &(0x7f0000000180)=0xb0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 20:33:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="b46b2210", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:24 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(0xffffffffffffffff) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:24 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x1040100) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000040)={0x2b, @rand_addr=0x64010102, 0x4e23, 0x2, 'rr\x00', 0x20, 0x8, 0x2}, 0x2c) shutdown(r0, 0x0) 20:33:24 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e3040000008008b0000", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000080)=0x4, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000000)='./file0\x00') r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x2040080) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r3, 0x800, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x800) 20:33:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r2, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xa, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc000}, 0x2040080) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRESDEC=r2, @ANYBLOB="000125bd7000fedbdf25010000535036f0041210c9962f823bb6f5e44500"], 0x24}, 0x1, 0x0, 0x0, 0x240048d4}, 0x801) pipe(0x0) open(&(0x7f00000000c0)='./file0\x00', 0x18d042, 0x0) mknod(&(0x7f0000000240)='./bus\x00', 0xc000, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x8000000200000402, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r3 = open(&(0x7f0000000600)='./bus\x00', 0x22, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) 20:33:25 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYRESHEX, @ANYRESDEC, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90e9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYRESDEC, @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x3, 0x4, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup(r2) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 309.536304] audit: type=1800 audit(1589834005.178:65): pid=14672 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16380 res=0 20:33:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYBLOB, @ANYBLOB="0000819d09446fefae27a6f443bfb2cdd900"], 0x7, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, 0x0, 0x40000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x0, 0x400, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10000}, 0x4004080) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) mknod$loop(&(0x7f0000000000)='.//ile0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 309.631231] audit: type=1800 audit(1589834005.278:66): pid=14677 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=16380 res=0 20:33:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:25 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0xfc, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a93, 0x2}, 0x36121, 0x0, 0x2, 0x0, 0x8fa}, 0x0, 0x7, 0xffffffffffffffff, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x50, 0x140d, 0x2, 0x70bd2b, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x7}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_RES_MRN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4800}, 0x20000000) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000001900)=ANY=[], 0xa4}, 0x1, 0x0, 0x0, 0x4810}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:25 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket(0x3, 0x4, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 310.027033] overlayfs: filesystem on './file0' not supported as upperdir 20:33:25 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES16=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x4010842}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000380)=0x5, 0x4) mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) utime(&(0x7f0000000040)='./bus\x00', &(0x7f0000000340)={0xffffffff}) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) accept4$rose(0xffffffffffffffff, 0x0, 0x0, 0x80000) mount$9p_tcp(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000003c0)='./bus\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="a787b7ccaac09d1f8fed428ead5c8376617d48c4f8396fe2bd613dfe0c84351f592d8be66a5d48ddf5d4deb6f3bc52d2178dc5c8253a7998d3d252d79bd6123e7243056ff687dbdf394a28260182ee8645f2b70fd28678f85ca611eb060499996a64aaf8d6a6109d15059d844b79a43d4e5c3d10132ae31feaa5fd87f5613308566ed67dd1991be535cf729027928e6b14d79cf2d257a5e5b4c2", @ANYRESDEC=r1, @ANYRESDEC=0x0, @ANYRES16]) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x122) r2 = creat(&(0x7f0000000200)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8}) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 20:33:25 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 310.336215] 9pnet_virtio: no channels available for device 127.0.0.1 [ 310.414075] 9pnet_virtio: no channels available for device 127.0.0.1 20:33:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 310.458479] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 20:33:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) sendmmsg(r0, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="f4", 0x1}], 0x1}}], 0x4000000000001ea, 0x0) 20:33:26 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5e0300000000000000c54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) socket(0x3, 0x4, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000040)={r3}) getsockopt$bt_BT_SNDMTU(r6, 0x112, 0xc, &(0x7f0000000080)=0x8000, &(0x7f00000001c0)=0x2) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x7, &(0x7f0000000000)=[{}, {}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000180)={r7, &(0x7f0000001340)=""/4096}) ioctl$DRM_IOCTL_UNLOCK(0xffffffffffffffff, 0x4008642b, &(0x7f0000000000)={r7, 0x11}) 20:33:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECCOMP(0x15) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000000)) socket$inet(0x2, 0x6, 0x0) 20:33:26 executing program 3: ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000000)={{0x0, 0x0, @reserved="eb730213cd10cf4bfad9defe014eea71282aa3949285301c8c1d83fb9ad7d309"}}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:26 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303008a78b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c7467d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="0800018636758154e1b0499ec4007063690011000200303030303e30303a3130", @ANYRES32=r3, @ANYBLOB="ad6529cb182e8e3efd7fa97be0dd2a4a08e2a18996ad713b099eae009877b417deb04d8afdbc4365cd820810b618fa236af431"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:26 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x9c}}, 0x0) r6 = socket(0x1, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@private1, 0x4e21, 0x200, 0x4e24, 0x8001, 0xa, 0x20, 0x20, 0x6c, r5, r7}, {0x9, 0x3, 0x9, 0x401, 0x741, 0x1000, 0x1, 0x92}, {0x5, 0xffffffffffffff7f, 0xfffffffffffffe74, 0x5}, 0x7, 0x6e6bb8, 0x2, 0x1, 0x2, 0x1}, {{@in6=@remote, 0x4d4, 0x6c}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3505, 0x2, 0x2, 0x5, 0xdfa, 0x5, 0x1}}, 0xe8) shutdown(r0, 0x0) 20:33:26 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:26 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES16=r2, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x4010842}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801c8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x10103}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b85c32dfa1ea50ee27197fa9b1900f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a4e0ee666b5892e3f3292da0d5217aaee2294f9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x803, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x800, 0x4) 20:33:27 executing program 2: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x10040, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x9c}}, 0x0) r5 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001b80)=ANY=[@ANYBLOB="280000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=r6], 0x48, 0x4c000}], 0x2, 0x4004090) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in6=@mcast2, 0x4e24, 0x0, 0x4e22, 0x0, 0xa, 0xa0, 0xa0, 0x5c, r4, r5}, {0x0, 0x562, 0x80000001, 0x0, 0xfffffffffffffffe, 0x294, 0x6}, {0x3ff0000000000000, 0x4, 0x7f, 0x90}, 0x3000, 0x6e6bbd, 0x0, 0xbf681d81ea3f63bf, 0x1, 0x3}, {{@in=@loopback, 0x4d2, 0xff}, 0x2, @in=@private=0xa010100, 0x0, 0x3, 0x3, 0x79, 0x8, 0x0, 0x9}}, 0xe8) 20:33:27 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303008a78b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c7467d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="0800018636758154e1b0499ec4007063690011000200303030303e30303a3130", @ANYRES32=r3, @ANYBLOB="ad6529cb182e8e3efd7fa97be0dd2a4a08e2a18996ad713b099eae009877b417deb04d8afdbc4365cd820810b618fa236af431"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYBLOB="8e4fa8ee810ada6c5b13f4bccb4754092f59a3e05a2d845d9b5876710a684634888967aa7434388c06074fa387769460a879d2e0e11611723c6bd66ced6f81888a8436029965f8209532aa231f1747f7bd532dc011262611531ba193d2a25d6e43e2bfff6aeda2b498caa9ff5bc4e39ae5a4151fc9bae4eae372c6ec9b3bef9b09f1a14aae1170", @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYRESDEC=r1, @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x4008010}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x6, 0x40000, 0x100000000000086}) 20:33:27 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8001) mq_notify(r2, &(0x7f0000000180)={0x0, 0x2c, 0x2, @tid=r0}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x7, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) 20:33:27 executing program 2: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:27 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x0, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff06, 0xa, &(0x7f0000000740)=[{&(0x7f00000000c0)="eabfb9708e01239fac6c351f4a078a863a8e6b980ec20c159a966ec07db58f8b23fd2b0ad6632113d6c29c75992e8b83c12d177d58db3de71138", 0x3a, 0x7f}, {&(0x7f0000000180)="0cf5866c9a135896cc97cdb1cd4377e7645351faf25b9ba56cbfbe5533b82b67a680d33396d93951d5193044f0f110058c54fa8acc107d8e5cf16b0781982b25718fb7d494ecba7dbfe9304b80c98da5478b804a166dde226528139bdd6b4e81610194aadd1fc3431feeb26e6f0f1f1e0d3642bb1a2c413f54f80fbe47745bcbec704ce8c0a30fef4e53f537f1e4b664afb8136435e2114139f23873301bf601313df15250f1bf32266901a154c5ee91822e8f4cd5072b0052966e0e8f", 0xbd, 0x2}, {&(0x7f0000000280)="aa3eee02b97b3b449a31daae98d6f3351205af6089a1f001d1a6070068cfe33c618f568d122608dd0fccd401a02c189cb804f7a69f42d1fee40c0b7f339fd0a0a01049abc296b2e075e8b040aa6459b962663561651e", 0x56, 0x1}, {&(0x7f0000000300)="08f6b60cdeb53bb2b2079212ced8b2876f7211bdcc695936734829d6baf3773574be4ac7b270c20bf5c3623bb75d29d03e11f544e8484a91e8cd5f744140b65358e5ea308a2ce0c52454538211464075b78a65165e18d55cc051ba4831a71cdaf5443a2d6adc9007abbb31f7bc419d5aecfa06a54a9cb9e4a818fd4889bb7a1e0a77b831ee31b34546aab7aec8e5e81ea8cf7f627f2194b3684dee4e7396474f629d5e", 0xa3, 0x8}, {&(0x7f00000003c0)="c84e2a127d95852744c3b249827f2c724e4a1fe2648b6167be2aeb8eee2a73be48db4f8a6c4744127f6a1677a8098d11b8b77e89996b8b0ec0e0d7e7b912a498753cbdb8773bdd87f162dd3ad59969aeedcb35a120cfab88f866ce9c54ab6ca9c957c4c9d2fd65140c51a34c75b9674292b610f9e289ea9086e77f69def265fecceb03d171d010b2a55c005e36787e6afc", 0x91, 0x2}, {&(0x7f0000000480)="ac089c7f14e25e9a9ba3ec29a409a552d746cc2f98a0837a870cad79edc049ea203f4fb0eeee8d0541ac58363470d57f114babf9398173b23dc922e1b22d11c18ff25fc85ba314f399c6d52f03069f548e250f1096dc59e18722fc4a46eab253ad9e26c3408265d6bdfd6d92a37e921db88a203c4e69f876d83ca9f6ffeee16ee8e7d3a298d6746364320184911c9ec69da03b2dc8e162e6ef63d150bcaa389762702a499e120b2e667ea5", 0xab, 0x3f}, {&(0x7f0000000540)="3a5081b328605177f911db34313050dff350d5ad491fa5e33af6c2e09afe152e26f69b6e7a705ec432a2e1a2759ca8315f9cc145525e8b11990ea287498adf260921c464e3d9f7820510a0b152b5a6ab21cc2b5fdfe43a841fce78100d133dfde433257bd0f9dddbccac005b5fb6fb08e24ba7168c56e460005c335aa7eda8a9e76137b6dbfba0cf6ba92e2047c4bc6d052e45d5edf4274cb1f13f0706783ba95944717468da068c825beb8a851951f0d5ba30ad6499693dbffe7418690cb7fb1f01d3201feea5896c99c3cd4b2367b144f9242a6d947d47", 0xd8, 0x2abc0}, {&(0x7f0000000640)="acedee7ba39b9456f78bd1ef720e8b1a94b749ba6f657ab7f9e291bffc0660f97dd914ec5f6d6559b6e1c17cc1f1e149015373cf0d7f3920f7e479d35f20c323f868010a6f9c5e800b868c045999b5e449c9facb0c76b4600d8c13503becae7afcd1e8247c251d626721729839aeba3aa0", 0x71, 0x8000}, {&(0x7f00000006c0)="f07b458a7b192a14865a53ca577176dbaf92a951dcefd295c2afd932c00dad030271c14a8e39cd9c4fc7eaebedb941", 0x2f, 0x7}, {&(0x7f0000000700)="a2decd11", 0x4, 0x800}], 0x400, &(0x7f0000000840)='mime_type\x00') r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_BITS(r2, 0x80045005, &(0x7f0000000000)) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:27 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYBLOB="8e4fa8ee810ada6c5b13f4bccb4754092f59a3e05a2d845d9b5876710a684634888967aa7434388c06074fa387769460a879d2e0e11611723c6bd66ced6f81888a8436029965f8209532aa231f1747f7bd532dc011262611531ba193d2a25d6e43e2bfff6aeda2b498caa9ff5bc4e39ae5a4151fc9bae4eae372c6ec9b3bef9b09f1a14aae1170", @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYRESDEC=r1, @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x4008010}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x6, 0x40000, 0x100000000000086}) 20:33:27 executing program 2: setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:27 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x20, &(0x7f00000001c0)=[@vmwrite={0x8, 0x0, 0x0, 0x0, 0x3}, @cstype0], 0x2) r5 = gettid() perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, r0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x9c}}, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getpriority(0x0, r5) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) dup3(r2, r3, 0x0) dup2(r1, r4) 20:33:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x414380) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x130, 0x3, 0x1, 0x201, 0x0, 0x0, {0x18, 0x0, 0x4}, [@CTA_NAT_DST={0xbc, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @CTA_NAT_PROTO={0x44, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x1000}]}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010102}, @CTA_NAT_V4_MINIP={0x8, 0x1, @broadcast}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @local}]}, @CTA_SEQ_ADJ_ORIG={0x44, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8e85}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_AFTER={0x8}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x1000}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_LABELS={0x1c, 0x16, 0x1, 0x0, [0x7fffffff, 0x8, 0x5, 0x2, 0xfe, 0x6]}]}, 0x130}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:27 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x0, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:27 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:27 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x5000, 0x0, 0x0, 0x0, 0xe68d}, 0x0, 0xffffffffffefffff, 0xffffffffffffffff, 0x2) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x47, 0x472541) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:28 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x0, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:28 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200047fd, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:28 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x80}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fda3fc2525000000080001007063690011000200303030303a30303a31302e3000fd000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@fixed={[], 0x11}, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffff, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x80000000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$usbfs(r2, &(0x7f0000000180)=""/241, 0xf1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000040)={0x1, r4}) sysfs$3(0x3) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:29 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x80}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fda3fc2525000000080001007063690011000200303030303a30303a31302e3000fd000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@fixed={[], 0x11}, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:29 executing program 2: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:29 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x0, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:29 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0xffffffff) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:29 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r0, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x80}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fda3fc2525000000080001007063690011000200303030303a30303a31302e3000fd000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@fixed={[], 0x11}, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x0, @broadcast}, 0x10) shutdown(r0, 0x0) 20:33:29 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x0, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x86, "82056675a46f7aa65482764d6f91586edd40d54d7057a3cca6ade5b8c91fcba3f51f606b68e4d9baed57029370f9068dd35e3fb0900d08740a64ce951a859c965a7000c8e0d74750593f9dcd81959cb3eebb7208d2e9a1e9b52895b5025cdec464e296d91169542fa30587e727110ce99f60b1499e052ef972ae587ea7f73d8da2e48c817e37"}, &(0x7f0000000180)=0xaa) shutdown(r0, 0x0) 20:33:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x100000000, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:30 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x0, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:30 executing program 4: open(0x0, 0x0, 0x61) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_procfs(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x200000, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4840}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f00003e6000/0x18000)=nil, 0x0, 0x1d000080, 0xb900, 0x0, 0x0) 20:33:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:30 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe4, 0x4, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x20}, 0x0, 0x4, 0xffffffffffffffff, 0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x68) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, @can={0x1d, 0x0}, @vsock={0x28, 0x0, 0x2710, @my=0x0}, @l2={0x1f, 0x1, @none, 0x43f, 0x2}, 0x7fff, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)='nr0\x00', 0x2, 0x3, 0x7}) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001bc0)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40008}, {0x0, 0x0, &(0x7f0000001ac0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001b80)=ANY=[@ANYBLOB="280000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r7], 0x48, 0x4c000}], 0x2, 0x4004090) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@private0, @in=@local, 0x4e23, 0x8, 0x4e23, 0x4, 0xa, 0x20, 0xa0, 0x0, r5, r6}, {0x8, 0x5, 0x9, 0xfffffffffffffffe, 0x80000000, 0x3, 0x358, 0x40}, {0x9, 0x4, 0x8000, 0x7}, 0x4, 0x6e6bb2, 0x0, 0x0, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d2, 0x3c}, 0x2, @in=@multicast1, 0x3503, 0x1, 0x3, 0x80, 0x4, 0x25a, 0x200}}, 0xe8) r8 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="00007e7e4441faaf3452676800800000"], &(0x7f0000000040)=0xa) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) 20:33:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30060000002e300000000008008c0003000000080001007067690011000200303030303a30303a31302e300000000008008b00f65b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cd1a56fa2d68334d1f15b971ac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0028fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:30 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x0, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:30 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x0, 0xd2}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r1, r2, 0x0, 0x8001) mq_notify(r2, &(0x7f0000000180)={0x0, 0x2c, 0x2, @tid=r0}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x9c}}, 0x0) write$binfmt_aout(r4, &(0x7f0000000180)={{0x107, 0x5, 0x2, 0x347, 0x3b4, 0x6, 0x19c, 0x4}, "02d3f8f2fbbba9f32b18d62fe764b9aeb01eb6fe3b5211d3a2288f7d1a38af40b27d97f4d6452ed8734d91585cd35c22e6329a5dc7bdfc28cd5c270cb0909f81a71052e0e539bd5c94b5e2fc696adba7418b26ca38ca328855c6856112992cee700cd5f58dda7d9429249f3e861939c8e749ea433cb47c04c47cb3b1f7314536c5e3eeba0bb0286148a9f66e9c51d891f8788469b17109cb7f1dcec37036557a470a42c1a4292a55d7271cbdc14dc31d786bda67e29272111936b7bebf054a61a241f5b9e5d6cf1f9a424b67b3623451ceefaa8ca6db68353b0eb351acfd8d831af22ee2b86f4468", [[], [], [], []]}, 0x508) shutdown(r3, 0x0) 20:33:30 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x0, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000a4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x5, 0x2}, 0x0, 0xe, 0xffffffffffffffff, 0x2) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x60001) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b003dd66236a8118d8473620b1269f4304ae90d6d70eabf6250d2e1c48d8b70ab31b6f4f351ab3c1b3ef99a5f1797bf888a3d379d7cebdef11ae18cdfd369b7824ba89cbe3528dde069ca36dad90a5ff1d36acd85bee621a16543cae29284ab5815aeb67999863381510cea025e082d230117c4d81e06c841fecf5db59d8b3c04c7b1fdd5b0ea5dfd22e1d08ac9", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:30 executing program 4: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x8}, 0x8000000200004d1e, 0x800007f, 0x0, 0x0, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x7, 0x1, &(0x7f0000000000)=[{&(0x7f0000000180)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x3}], 0x31824c8, 0x0) 20:33:30 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x0, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:30 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$dupfd(r2, 0x406, r0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x840c2, 0x0) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r4, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r4, 0x0) 20:33:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x67) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r8 = open(0x0, 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x8000000}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000600)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7800ff030000000050ac57e0641f92626eb187711925573d99c7fe46ea2b0fdc5fb003ce57abf581589a5f465fd4216af0736698b0ccffb28d0d3248c76e0000000c0ef90c70f85f72bcb2975ee933ebf6430c98c67d1f6027581a764f49d3332491d610bf512d4cbf955f8de59053fb5bfd0caafe3d710f4e64e60000003467ca538f0376bc5cc4dde8291451319b0b2f2aed8e8f51b85e0d247bfdae22f898650cc492ec1d0e"], 0x12da00) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080fffffffe) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:33:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:30 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 315.454694] audit: type=1804 audit(1589834011.098:67): pid=15042 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir951775731/syzkaller.vaI5L6/162/bus" dev="sda1" ino=16408 res=1 20:33:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCCONS(r2, 0x541d) 20:33:31 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, 0x0}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$phonet(r1, &(0x7f0000000000)={0x23, 0x8, 0x35, 0x75}, 0x10) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0x10040) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000180)={0x0, 0x0, [], {0x0, @reserved}}) shutdown(r2, 0x0) 20:33:31 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x54000000, &(0x7f0000ffc000/0x3000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="0d000000e0f4d67dc52b80de7f2d6e3bb74494a951d966d3914948c83edc71b351c04b73083baa88718d09f0c0c719e3812048d9a10ec620b09d08f674193bb43b", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d45cfe314d5616a37eb7d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="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"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x9c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00', r3}) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x3, 0x3, 0x4}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x9c}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$6lowpan_control(r6, &(0x7f0000000200)='disconnect aa:aa:aa:aa:aa:10 1', 0x1e) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r7, 0x0) 20:33:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000002b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000000980), 0x10a9) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x46000) lseek(r5, 0x4200, 0x0) r6 = creat(&(0x7f0000000000)='./bus\x00', 0x67) io_setup(0x1ff, &(0x7f00000004c0)=0x0) r8 = open(0x0, 0x143042, 0x0) ioctl$FS_IOC_RESVSP(r8, 0x40305828, &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x8000000}) io_submit(r7, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r6, &(0x7f0000000000), 0x10000}]) r9 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000600)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7800ff030000000050ac57e0641f92626eb187711925573d99c7fe46ea2b0fdc5fb003ce57abf581589a5f465fd4216af0736698b0ccffb28d0d3248c76e0000000c0ef90c70f85f72bcb2975ee933ebf6430c98c67d1f6027581a764f49d3332491d610bf512d4cbf955f8de59053fb5bfd0caafe3d710f4e64e60000003467ca538f0376bc5cc4dde8291451319b0b2f2aed8e8f51b85e0d247bfdae22f898650cc492ec1d0e"], 0x12da00) sendfile(r5, r9, 0x0, 0x8400fffffffb) sendfile(r4, r4, &(0x7f0000000100), 0x8080fffffffe) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 20:33:31 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 316.566354] audit: type=1804 audit(1589834012.208:68): pid=15096 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir951775731/syzkaller.vaI5L6/163/bus" dev="sda1" ino=16081 res=1 20:33:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(r1, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, r2, 0x0, r4, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r5, 0x0) 20:33:32 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x10000026, 0x0, 0x9, 0x0, 0x81, 0x2000000000000}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="335c9bfd68cf8aa9294ae8339d12b002eb9a57"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:32 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, 0x0}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$bt_cmtp(0x1f, 0x3, 0x5) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x1, 0x7, 0x201, 0x0, 0x0, {0xe, 0x0, 0x8}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x1}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000008}, 0x8000) shutdown(r0, 0x0) 20:33:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:32 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, 0x0}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000000), 0x4) 20:33:32 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:32 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xb, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x12b0, &(0x7f0000000280)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb0800411d12a200660000062f9078e00000027f000001862c000000030703689011f3a4e3ce42ae8a1875dfb10a66c2340212b30e0ba0da1698c4196732a9ff6a7969e50e2b0bbc47a08d2420cc5c93e4863300000000021103e07585b2cda5327fd5c4a005309e01048dc4060c2cd5b2fedcfe592d17a606067733ba600704494c05020000000c21880b00f8000305ca0003a452755c89776154d061c7241fb5ff37b9f87e9af86f9170b6d14278496df4d77579af5b5cb89b0fc4bf062a19a2743266d73817cbdb680b815b4943e060d69bb8b35e07aeeb437f09b9417b72a34be383a9067ea17df37067209e2322e7b72d49472b189c2734936f2c416c8ecf6bccc62310186c4cb36d80aa51de6f85fa6748d4da090c9f0a51d40b12d36d09a17b8a5b64176f42d5ac576ef5bae4ca290989160dd4c33a9f0df040e3d56f42ee0f01f37b09991d79f0aa8f6bdf5d26aa5212d3488b94d70af5b486067c46ffec1b80ed5f6a3af4d1c9314e19be7e4c8c7f52add81b87ce1bed054fc9159326a48613a647934606034c0c000800927a1601f641412bb33fbb5a3808bbbcfb5c0c6878739ed2bad88bfbc6af8226eb3a6abb717079c731973cc47558107c320b25877b1aacc05ca98088253a78a2e26dc3b700d4a9433209799292d8d29ef8ea5ed69fdc24886743bee5689303d57c363af3e730afb7630b2f1f09e804c81333bfcdf81ed45bdde048211cc994dcecb5fc789e4b171688942514e903df72d408f493aad7144367cb7e4d75876e06b9d44cfdd309f38f77ca3e4566f6924dc4a3ff9e9237ad2a05255dedd108d33d4c34d0d048ce22c7eb37503610010086ddd1dc3ede4ba81f64844704c802b9a9137b080088be000000021909e0050100000000000008080022eb0000000224e03f030200000000000000007fa1190800655800000002ef2fe1b5a7f233d056ec27b94853a37812d7bc4c8c983052a91ec574d8a41ea3445be57854d71754de93e4e5beeeb596259129a08b7a461b340b2c9ffed1b59238fedb930fcc65b648c69752d9cb6d7c59b1acd12e38181da92cd48a41a20b1c71529938173c8eb671aa979f651258fc068bc1090854323672580a3f680fa9eaf6508bf62f5a2b7777a1f231b26831697cc998822d886b0349d8749945d2613e108e957f8fc16ca154877a7ab32192d425538ce9bb06d5490bef2d81c08b4fe6290d62bfce97b194ab263ac4b9360c3586e7f03b7549b8700acc191eb5b4bb4d85c3d3bc464cfd9d7efe468804a3d61eb09a53ca1662092d6b15960bd29bde1e60c1b58aa59c81e22711a34fe01c97f446223b073d230ce090b395a8416e8e1c1af54580038c6cda96db283e076a7cf1413d46434ef3b43bdd45d6a3ca2782b96ca2c7639472aaf6d298175cbf08baba5b4b329b6107ea3a1225a6df74f59402594566a94acc832f3332c1f99f2ba5ea8e465a8dcbc114a2f9d97516edda9ac603c05f0d06dc5d26c6e9224885ce063c37bbf38b95c291d9a27dc6501e847104a7c9fd685275578dcb3510c4cf5532df6a3f045682eaceffcab217e07a403264b06332d892db6a5a9110b72f3a6a9fca02dd4eace9529349edc05fb34a9347f670e26a2694a54a0550cc06f6ca6dbfcd9b056679a8fa411bdd03df9dea8aae6b2c4dcad94db294dcd41eba35556afbd7edf9ebc628930013d6e4c78c11e1789a4506c5ef6024462be15319d2cb9d25bf75c03a9a3d5fdfb7e16386930c6a5f1ce8ffeb30d9de8c0ffa5d1cabd2666158348b8cf174fdd28a02e5b4be9ba3d1aae93d00d98d95d7412639dfef32176da7d91592f2427b1f2c4ef8a6999dbeceea4674beae65e216f335debe3404a371c0572c61eb874df79232f288211a3b613e3a134f0257fb78daa039cf9f1b8c00cbb6539b2ba06a9200ba9fbf5166da71a33103771b9310a03fa962517df3d23d39ef716c3a2cc511dcb29b4f1f3fe454951a8dd47d0615ca0beae0f1121c7bfdc3c0086498aeffa994dec4664bc92cabcf5b3084f63b149c96a3587e92be7d5ed4beb93785e023fba0cb029f7ac0a45024e54fb9b95ed927ac3a11a880c21d16ff8235423b38199551f7fb71ce8687eaab83497c80e73bfd5eb527ec8b36e2890fb73bc90192e20cf7259169ef46b184c11aea15318df6e0fa9ba53595db329717cc24453dfd9a7568f4bce2205dc134889d1e96957faf55b5087636ae041aaf10278cb70da2191ef3390c82895b875cdd621e90f55d3243ca2b494f4829d5f5bc896daeb00a42358aff47184395b08e59111dfde5f82499c6327b985f7d0bc500ea8c9042dda8b39a191f783f588d9840f94f7f72178aebd7c6d5e4d5ee45218c510e186a3f98ee6c88b13110968d80a48dbd71b60d068d74c9ee8935a1fb0b150f608706e009136648ba38f8d3f1e10f37f091ca604a7d8db08232dae45f6e520233fca20cf122156c99c4f314091486e1ec5bd7e1821fe51efef13c3c455486b1eac3247a2956db6295c4d615e54db65d811517b427bfe015dfc6bf59428871ba05b03dc48e0ab6df6231477653cddc1e9214a56143c556bc0d8eadbe8381aa48d7b9d3f55f6637188e0943186336971012bc91ec2e29185155b755efbddf9068ee1005f330bc45afdf08eaebfb7fdff98a473c45e2835cc4de364b5b0358686fa3103f601751e7bfd915361d4bf60c74a93bf625f49be879d8537ce2c94def6c5a3a07c00f1d1dca4ff6ff104f845b9fa0117065b8728ea557514d9d975837f828e91221a00648148840ef10139f3d19867b1a178149bdc899382ccb102ad181a42bbe8f7227302800a271be38f589e0d7b103b7d6fc0df55eabe16f11cdd48f46850ad68a16fdaa844aba68e715b0b635e0fe3917bff933e028835374b90c6f9407f53ab0c78ae3b5598663a9666dc173bf0e16ec3a44c888e3f4658c534f1161cd4cbff694bd512ddc1534a92e04f3c457a10ff2be1c5e04193f25a173eed2d9144f74f8264ea9ba45fe06747efa7a7e209dfbd32b57eae574e31c82134b043fc844d6ba4b7818a6ff940c8f8bf587063990eeb6cd595ef6871951cd5c1d992cb7dd0f43e7d5f5fb61af033ea6b00dfd50983903d9486719971fd5060b0ec94e501cb29b4372d5bd9be6fd2cf16a54f50de236ba6738c3ace8bdfbd61389caa9c959c2ca1c62dc40d890ba63502320001743497a49ed050dd591b7e0c54698f941f19ca64385be276f416eefb55a9100fd921064ffdfec33b9ebb574fd24103d3cc1084d7d07b46cd9fb743583f1fd015f6840b73d780d15903ee6d2fc68a1be16cc003901a6dd8c7cf7fd7912343c6d38aecededcb2bc436a185a892fe0eeb7e9d2ca65ce20b123db2f247358d06fe7f0c87733d93c2d6f799e408fe538002bbbe52c058a0aba1c2cea37e95f31dd18e529889c110786a753be178d3ad4cc41da2ef055ede5e86739a07c88646c2f55bda30c385c392bac51516ce3cf0f9f1d0244c8f54989276f03821a54e60598108a96fe36f807510c09f6ea5595610d65356efa87a22611d8e30609f1e2883205a0ef4d5eb3963a30bdbb590753bd7d5b07d7526698133cfb0de6e03b3c64e6a969a7a90f34e9dd10740cd9c726ae837b121e3317ac13682d23cafe54b116ab8c585443510a45a1ec98a40c9e06049529c0eeda67e76678b0864f77db5cdc3f52c2cda2fd46f705886deb09cb4da17bc1780f39e5dc873706fdd3007039e615cfb522e9895f0101d9a62ea4de80c76577dd2b783ebebcf187f6dd47a6fda7acbf3ad2d1664a52939d1091778a397192ab64a4201c5a633462bc886746922e9823e3e921ae724cea02a75f41ef76374544a5319b328705f370ab57c5ebde498dbfbbfe17f34d346e9c5320042da0ea446054615049ae11ad50a01586764a1c6747f62425c7e1011c99f234d3650f7bb4eae2af333533a8929cdfc1f900b861bbcef440db2baeff2cd31be2ecec4905b337c61c42ec820aa678f77238ca317ba4915d49d99b50707bc075e61b1e60b4e7857a7d52075cc22705ad6c09692354ed744e413e2f3c22f4d581435e74e682051e74cadcdabf26dfa27854897338c5c8bbf0f1b347fd954a245291be706690146ddad51b6428cf7dc9c4df1de2b5b7cbd282c5dcaf440f9e66c38b3a0cd30d27df0f950e0a89bf75decb5a3382fdcf16a69f7a1711972680e582f6ad4fefce246fc532ccd299c0e61f360c1c65756eb4756d0eebe7ab23de7549a4e804a2fe07509b868a0a645f7e03298adcfd625034b8010eb7a3c04a175e4176e67a13adc96856396fbd37d13fd1728defe88f6e5e55e3ed4ca4c80f577fbd12bd3624b5d56f2f553637d2f2e2153ecdc4523af4d316b06fe1c7cd2b3fe1d90058d07bc16249a457f410829a118160643379d2f6ef174335d65a5b1a40830c85be6f023791e88134227a6ba1099e3f28ed6da8cf5f169380a4a4016da95bb59688a0204c2ef6dfbbf008f91340d77ca7d40f7aac3201057fe1ba6a2d65a689b3ba84ca1b2f7c59d13db80c214ef128902e3753ca13b04dfa9fd9582b3a3757da93195e85071da4727b884b7d3c509ba4df36aff1d0fe16f4d6aa5261255dfc61845b2332603c6b4a5692e452d09eaf1c764e4ef491a4612cfd1543d5f22968ceabf958c58597758a76fe35eee23a412b9794ec5f97cc10b57b5e336f178376a429216f9562ce003ab23783129d163abc2ab183582471c2505a63d7bd37436a9f1e0e014ca224b7c5f55712ea9386d7fe251fb17cdefb3bd92a591ffe4ffb640f9769ac7a888bf7042ed712bcd50e774d60ea1d0163640464200ec3705440645b6bd9efb376d80d05b96ed67d113bb8fe6f23f0910c7fe1fd5b02e775d3b5bd98c534c46232ac7e58863e7c92321312921cded9b78f7dbe970079da01f6cf34860414b958e9877b2ad55e0038ceb28be04eccdf2740f80e58b9781d96a18fe1591546c7c35eaad33158fe7ad02bea3d1a443a12ef04e20148fa9aa183b9932aea28495c76d4a0396f3787d5b9b4bd839c50a9c96e6c25128c9c0d24b5d36431ee7b876310ce5cfedc88151f198e4d8f93099e90240acfdcec225d5b6187e6bb23c0ccaf8aa9bff84d5abec355c061cd479d815f3604a3336e68b5a12a49d5fdbd7939cc7be53534aa96622b5ecfc28853f827d70bd06b7943a9f6e6693b9320348384a0f37193ba3a9bf301a685920e29aea6cdc3ca2647efcd879a155feb3b10cfebe452dbb1d6d50edd9cf8f6331af011972bb37975e155b2e259bc153f98d1021e156aa011b2e0116b1ae39f36f821f4ade4196f7c081fced6ccaa93834913816e180d1d1fb3ff61b28b5e6d1e36b56990f3fac46429b5ecc32be076b59df79e0f56426b5db33f0007bbf074e12459217b146f27219ad94990b310f00b9717b5af2ed08c10978d14e78a60066e0910252a78330ee551d487da7645778baf14ee2dd1f160761a337e07b02cff370232710ec1412f0aecf6639d94b57f282f7941f546e5cd792ea96c9da384658a00945265986447f5eaaf09c9d142e14666b17568bc39d9d0a62b7b2c098480764f4ae507dcc46533e3159e72b038e9f0322d38aff26fe781eb3c46e0722d9c36ea61308168c34d178a002f2edbecf35a43b159be12b43f70790f2cc49e2eca8c8cf8bb202079cfa575d2efd5db6f24049163fbe4615af17c82c28ea454dee54c81b8367100258cfe1d0e0148275f132ab6fcea2df225a643bcb0f368555df38948bad577c7e5c02af5b4b8da08b2c0a868296edbd4fdf7a24c70374ac881c37cece5e394d66fc99b695005327d2cf0e7c81e57edeed7dee216a9d301aba22fb4a5f44e011cd5d362be14cd208a69c02a212b7bce8595e1687a247e3857487203c57f220a64b20adf06cab6915377e996797b1cb57667c145d172c429e3609071d97050058cc709b6bcc989d78d906a3c990f17959186835e813ed461c87099b637cfae98e6f7131aef54f2e80abb039af4639afdfc4df882c120625a8cabae7cad3bd831c9e21fb8b42206132ed9c2ebc1107c5c13910d89df10c5f07b6102322e4009c9a72b80386b4f4a28bab3ca205d51a31bc4dbd662d42cec9d401e922d1bc89316e06b9a87986f924c256a9c8b5a4ad8ebe268f7720a071fd3bea7e8b8ca5dd752f5437affc21a4704f45b050c8f6d54fca2f38f7c9aca039190eb4b269d31ae4ae7b33c0797026cfee12157cdac4303a443883387a1bf1b8810fe4be48343a6903eacb77c42c3b4314848530a1a7a2e50dbf0c3a16d1bb241f259e6f3a69fa695e8854c121a594d3b6e5beb3f85c89e21f6ec3d23e93bd03a038dc86d6f0b1ed8d6c0907054e4dc68164799c83078c5f57db37042c35cf2966d6f46032e46c832614443e332cbea349c6ef2152e22a4956ba3b3c6e32f4f0f97af4f1136a617592079c5f19f7d8376286551346066effc398fac6b75b230bc5657eab4818dd20bdf12f26163035ac8893478d6df7586a6ca20db1497c533317bf0f62983166af964b10d6c44fadcfb43e2ac7a1bc64138ace6c0fdc250bf9be2d9a787c4c6df55212ef2ad8a9b122bf0a4150222875ea06f8df6f8b88b6bc15cd5ab9f8782bbca8a03b3293c5a9a233bd1a7b30ef11f7b8d354e03ec790d7cb30cc440f0fd0f05c0a48b2cf2724d306de241ae11fe8c946cc66763bbed5af8de9e0f"], &(0x7f0000000000)={0x1, 0x4, [0xd, 0xcb1, 0x56e, 0xbf0]}) setns(r2, 0x4000000) 20:33:33 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:33 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a400000093cc6d1af2c7e152bce627476aec0194a0ad2b096a0081e6c27b1545a6c666d8e7158801a4331df9be35ee8371c510b99ec7e54470995caee77d307bf14cb1d0bbaef2c6bb63d3885ad2ee2d816a70c00ad0d0b65e2ac95e3c311080deb85aa41415ed5dad966c27b635b85081a3bfd126fa445e039a047f92920274b98dd5b705df917c5fbb260ee17bc6693480e53f1222ff3bb49ca85689c537dc24e9b5cb2cb208cbfd7aa2c76e269bed46bd259c7bd74f4d4f11921ee0cd784ba8f7f94929b363bce280592ebc5e973a5582e4c14adc86ce5b7a884d6c9db8339f9f072b14280c7ab9f79de8255612815ad10f0c7b09eb", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="c0b02a5166b63a3e717ab22c3a3831"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x99, 0x0, 0x0, 0x0, 0x0, 0xffffffd, 0x51400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xc2}, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x62e001, 0xec) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r2, 0x0, 0x0, 0x4000844, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) shutdown(r0, 0x0) 20:33:33 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x5000, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf25250000140e49e2c284a2faf385f70000000007003a30303a31302e300000000008008b00232288323e2a85597cceb94a3f8eec615ff94189e419e0f10b21513b6db7ab4df51fe237a46569f358ddc0e059cc3ee5286b9f8c6f", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a43302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:33 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0xfffffffffffff801, 0x400) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000900)=ANY=[@ANYBLOB="8f46a2c6fcad8af0195d4f57b28537ed5f0ab494e229f703662413d9598ed7653abd037a2c15693aa654dc3cbe29c33e12eeb28bca994a526731857165a573d097a8912b565bb07f3d73d938b306ff7d19e3836468f1e03d710a1bf04ebd5e65a9e59cc5eb0b4f8f03109102aad07c2d7b830672eb7d1e343977e07143234c0b86d30c951e6d325003b960a984c5a324b488cea2131d3b4520a0996c5cfffc9825eca85be938e226ff4f1a4272b0c67c10e6b29250e423ebbf1bf7e2d3747f42a588fae00a1c82102b3c45864823305b3288d7a6f0b8e817853480dc271e559371f2", @ANYRES16=0x0, @ANYRES32, @ANYRES32=r4, @ANYRESDEC, @ANYRES32, @ANYBLOB="080e0179b50237f143caffff7f9bf40008003030303a00000000000000cb9c86eed7cd543d986fafb9d8366bda4b761d185d4ca9ef6d8d01f6163b13deb776c02da7dbdee7b3f04783a63f22e14b62924b7b02aac1808979372908f151a0dd24eb5bdbccdbf0f8f6636220767413ed2cbd5c8c98c175403146e100a460aa0b3afab14d52068d7783a9c574925d6fb6d21713935cf0e4e3284d9a2cb8bac9bd8f0d991c86e12374", @ANYRES32=r5, @ANYRES64=r2], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:33 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000, &(0x7f0000e68000)={0x2, 0xfffd, @local}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x598, 0x503100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r3 = dup(r2) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000280)) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x200004) sendfile(r4, r5, 0x0, 0x8001) mq_notify(r5, &(0x7f0000000180)={0x0, 0x2c, 0x2}) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0x6, 0x4, 0x3f, 0x7, 0x0, 0x2, 0x9000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000400), 0xc}, 0x2000, 0xbb, 0x9, 0x9, 0x2a, 0x10001, 0x4}, 0x0, 0xe, r6, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000240)={{&(0x7f00000000c0)=""/63, 0x3f}, &(0x7f0000000200)}, 0x20) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="040025bd70000225050000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300020000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4800}, 0x24000000) shutdown(r0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, 0x140c, 0x400, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}, @RDMA_NLDEV_ATTR_RES_CQN={0x8, 0x3d, 0x3}]}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) 20:33:33 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="180001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shutdown(r0, 0x0) 20:33:34 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f0000000080)={0x3, 0x1, [0x637f, 0x81, 0x4, 0x6, 0x1000, 0x267649d0, 0x20, 0x6]}) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000000)={{0x2e, @loopback, 0x4e20, 0x0, 'lblcr\x00', 0x8, 0x6, 0x3e}, {@remote, 0x4e23, 0x2000, 0x6, 0x1, 0x800}}, 0x44) shutdown(r0, 0x0) 20:33:34 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x1000, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x96, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x36121, 0x4, 0x42, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:34 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 318.576697] IPVS: set_ctl: invalid protocol: 46 127.0.0.1:20000 [ 318.625653] IPVS: set_ctl: invalid protocol: 46 127.0.0.1:20000 20:33:34 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) r3 = socket(0x1, 0x803, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') recvmmsg(r1, &(0x7f0000002080)=[{{&(0x7f0000000400)=@nl=@proc, 0x80, &(0x7f00000018c0)=[{&(0x7f0000000480)=""/36, 0x24}, {&(0x7f00000004c0)=""/249, 0xf9}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000015c0)=""/32, 0x20}, {&(0x7f0000001600)}, {&(0x7f0000001640)=""/127, 0x7f}, {&(0x7f00000016c0)=""/209, 0xd1}, {&(0x7f00000017c0)=""/206, 0xce}], 0x8, &(0x7f0000001940)=""/22, 0x16}, 0x3}, {{&(0x7f0000001980)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/51, 0x33}, {&(0x7f0000001a80)=""/171, 0xab}, {&(0x7f0000001b40)=""/230, 0xe6}], 0x4}, 0x6a0f}, {{&(0x7f0000001c80)=@phonet, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001d00)=""/215, 0xd7}, {&(0x7f0000001e00)=""/189, 0xbd}, {&(0x7f0000001ec0)=""/154, 0x9a}], 0x3, &(0x7f0000001fc0)=""/148, 0x94}, 0x5}], 0x3, 0x10001, &(0x7f0000002140)={0x0, 0x989680}) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r4, 0x404, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4040}, 0x4040011) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$SIOCX25SCAUSEDIAG(r3, 0x89ec, &(0x7f0000000200)={0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x101000, 0x0) ioctl$TCGETS(r5, 0x5401, &(0x7f00000001c0)) setsockopt$inet_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000000)="3176048d7df17931ab0aeb11c3e56e10c260a29da1f4fc3ea7656dbee2bfe6e9dc220ea7bfedb1c578da2ad2ced682cdab08843621a2757e7dd14df0e8479eb1838135aae3452d013bcc6177394468f7ab9b1e2e30b95a37134ff76a26babe3a3e106359a64bff1feed0865d76a11091c4043d71968030e0d56476b1587b2de8334502f3989f28f34e64161253cfd9e5f98557748f8612c9d0e16bec6e738c5324bb0f9a195058888b0b3829f32687cfdd8da073a227", 0xb6) 20:33:34 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00080abd7000fddb832525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b006c203c45954a5568c73537f43488fc8ccfb9c7f153d3c30e2dc0960ed645195e5548f1882891d50f1e890b5789cbd311fe5b700a855f41", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:34 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20180, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000040)={0x8, 0x5, 0x10000, 0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}]}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r1, 0x0) 20:33:34 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:34 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x4000) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 20:33:34 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:34 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', 0x0, 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x90}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x8}, 0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x2, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) 20:33:34 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000010008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000000)={0x0, 0xc, [0x8, 0x0, 0x0]}) ioctl$USBDEVFS_GET_SPEED(r1, 0x551f) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r2, 0x0) 20:33:35 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x25, 0x2, @thr={&(0x7f0000000000), &(0x7f0000000040)="4f1c59960b520059321551944e5c89ce364b485611bc956cd296aff8347601e0a8654e28f96cd9341d560d2be89ea58339c73e8f208452fc8f08761879f4584ac7cf75dbeade6002a6709b6ad4"}}) 20:33:35 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x536d9513, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB="a400005d", @ANYRES16=0x0, @ANYBLOB="00082abd7000fcdbdf2525000000080001007063690011000200303030303a30303a31304e773b45cbd57a642e300000000008008b00", @ANYRESOCT, @ANYBLOB="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", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYRESHEX], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) io_setup(0x4, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x6, 0x7, 0x4, 0x2ece16b8b947fc89, 0x8, {}, {0x3, 0x0, 0xda, 0x8d, 0x5, 0x5, "10f0e08d"}, 0x1, 0x2, @planes=&(0x7f0000000000)={0x9, 0x8000, @userptr, 0x8}, 0x4, 0x0, 0xffffffffffffffff}) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f00000000c0)={0x2, 0xeef}) 20:33:35 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7, 0x4, 0x3, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x3a1a1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001006c6369001100020000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x81}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x9) r1 = fcntl$dupfd(r0, 0x406, r0) sendto$inet(r0, 0x0, 0x0, 0xf7d, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x8c220200, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x9c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x6c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x5c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffffffff, 0x9}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x2}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x0, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x9, 0x2fc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x4, 0xfdffbffa}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x9c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x6, 0x8, 0x1, 0x58, r1, 0x8ce0, [], r4, r1, 0x0, 0x1, 0x1ff00}, 0x40) shutdown(r0, 0x0) 20:33:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:35 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000280)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x52f1, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x122, 0x0, 0x2, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000500)='/dev/bsg\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000800)=ANY=[@ANYBLOB="01000000713447e64d86d2529041b25763a1e485d74b01c0d956de90f09ee5e196da663f7c033b2da7b247348410c392932bc84c5194f00008d3be7e7a8770b697946bac234e58c7e2b154962b9217f512ccae8de20e629f966e1e1ebebfc3aaf20ce58d1b99be761fa71acb13feaa1499537c701dbbdcab", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525400000080001aafbd9079203be37007063690011000200303030303a30303a31132e300000000008008b008e06cddb66f908caa3d3976cb31f8a1e0b1618464a06bf8fb075d03a00553bccbc63f01a8dd15cd078f841f8c433846b778f48009d48107885b4a809bf", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e208000000ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162097729ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a8333b98c245c0d34898e66a88e", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="5156dc39a8e057817e565f558faf7e5b8fc0830fd1dec375af1393b3f84f0dee195f677e8cdb44484f0f42d05ad0b7d80c294e97b4053b186e7e4141904154e9cbdcfb18f4998d14f610e25c4618c463602346eadfd45ff5d7b9b76b1a0ac0a67f84af52"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000001c0)) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f0000000280)) shutdown(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_DELLINK(r4, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x144244651104f6f7}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="300000000414000228bd7000fddbdf2508000100010100ed07000100dc241b5074304b234a68fa326253e30200000008000100020000000800010001000000"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0xc004) 20:33:36 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x5, 0x81, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="dce37da4000800", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525009ea1364b35d8729134d01a000008000100690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1dd98d90f9bf162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d521700"/174, @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:36 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011008700303030303a30303a31302e380000000008008c0003000000080001007063690011000200303030303a30303a31302e300082be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5da0d521700"/179, @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0xff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x918, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0xfffffffc) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) dup(r1) shutdown(0xffffffffffffffff, 0x1) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) close(r3) ioctl$SNDCTL_DSP_RESET(r3, 0x5000, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x50100, 0x0) connect$x25(r6, &(0x7f00000000c0)={0x9, @remote={[], 0x2}}, 0x12) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x74, &(0x7f0000000000)={r5, 0x0, 0x10}, &(0x7f0000000040)=0x18) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000040)={r5, 0x2}, 0x8) 20:33:36 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:36 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:37 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:37 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9512, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_bp={&(0x7f0000000000), 0x1}, 0x7f123, 0x80000001, 0x2, 0x0, 0xda7a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3719927b1aaa5c0b) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32=r2, @ANYRES64, @ANYRES64, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:37 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4100000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff3caa450cd4b803000000000000000000000000000000000000000000000000000000000000000000a99ab03e7f8d000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000feffffffffffffff00"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:37 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="2e00000e08e3e300", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x38, 0xe, 0x6, 0x401, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x488d}, 0x44000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) shutdown(r0, 0x0) 20:33:37 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:37 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) getpid() getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:38 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) getpid() getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9512, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_bp={&(0x7f0000000000), 0x1}, 0x7f123, 0x80000001, 0x2, 0x0, 0xda7a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3719927b1aaa5c0b) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r3 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32=r2, @ANYRES64, @ANYRES64, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000840)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r2, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a020000000000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a8300"/184, @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b006f4c0eaf7846f0b22e116b013b5f31746de1f6d3d5eb4065a4d2d71a595b8a9e2de48db595d645d131a1e9c712cb07499c056f91252ef1c0a3e1974e41a642abc0ed66afafe9263840dd4fec01f8ab3ecda998fea8590f3fc3b320cdd2e1510b69d9fec419456ecacba2e215", @ANYRES32=r3, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) getpid() getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:38 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) getpid() getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) getpid() getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:39 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:39 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x3, 0x0, 0x0, 0x9, 0x200000000000, 0x40000000000}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd6b00fddbdf2525000000080001007063690011000200303030303a30303a31302e3000000008008b2000", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r1) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 323.652268] FAT-fs (loop3): bogus number of reserved sectors [ 323.675433] FAT-fs (loop3): Can't find a valid FAT filesystem 20:33:39 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x0, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:39 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r1) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:39 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:39 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x3, 0x0, 0x0, 0x9, 0x200000000000, 0x40000000000}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd6b00fddbdf2525000000080001007063690011000200303030303a30303a31302e3000000008008b2000", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:39 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:40 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = dup(r1) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r5}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:40 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:40 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0x0, 0x0, 0x2, 0x40000000000000, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) set_mempolicy(0x0, &(0x7f0000000000)=0x200, 0x2) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x53, 0x7fffffff, 0x9, 0x1, 0xfffffffffffffffd, 0x0, 0x2}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="f15969d1", @ANYRES64, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x5, 0x1ff, 0x40000, 0x9}) 20:33:40 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 3: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x940a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(r1, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x536d9511, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xffffffffffffff98) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r3, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRES32=r4, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) 20:33:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:40 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:40 executing program 5: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@broadcast, @in6=@empty}, {}, {}, 0x0, 0x5}, {{@in6=@loopback}, 0x0, @in6=@loopback, 0x0, 0x4, 0x0, 0x81}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getdents(0xffffffffffffffff, &(0x7f0000000040)=""/241, 0xf1) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, &(0x7f0000000640)={0x80040000, 0x0, 0x101, 0x20, &(0x7f0000000440)}) syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$adsp1(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/adsp1\x00', 0x2000, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/504], 0x1) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000140)={0x0, "37e624d0e8296f6cda92bb4973130ef1c866dc8ed8c0db04152d3599bd611238"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount(&(0x7f0000000240)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x0, 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) [ 325.013752] ================================================================== [ 325.021410] BUG: KASAN: use-after-free in do_blk_trace_setup+0xa5b/0xad0 [ 325.028258] Read of size 8 at addr ffff88809224dc40 by task syz-executor.3/15604 [ 325.035789] [ 325.037428] CPU: 0 PID: 15604 Comm: syz-executor.3 Not tainted 4.14.180-syzkaller #0 [ 325.045412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.055135] Call Trace: [ 325.058184] dump_stack+0x13e/0x194 [ 325.061861] ? do_blk_trace_setup+0xa5b/0xad0 [ 325.066506] print_address_description.cold+0x7c/0x1e2 [ 325.071884] ? do_blk_trace_setup+0xa5b/0xad0 [ 325.076655] kasan_report.cold+0xa9/0x2ae [ 325.081690] do_blk_trace_setup+0xa5b/0xad0 [ 325.086298] blk_trace_setup+0xa3/0x120 [ 325.090405] ? do_blk_trace_setup+0xad0/0xad0 [ 325.094904] ? retint_kernel+0x2d/0x2d [ 325.098799] sg_ioctl+0x2f9/0x2620 [ 325.102710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.108172] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 325.112746] ? retint_kernel+0x2d/0x2d [ 325.116620] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 325.121358] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 325.126269] do_vfs_ioctl+0x75a/0xfe0 [ 325.130110] ? selinux_file_mprotect+0x5c0/0x5c0 [ 325.134850] ? ioctl_preallocate+0x1a0/0x1a0 [ 325.139620] ? security_file_ioctl+0x76/0xb0 [ 325.144009] ? security_file_ioctl+0x83/0xb0 [ 325.148401] SyS_ioctl+0x7f/0xb0 [ 325.151751] ? do_vfs_ioctl+0xfe0/0xfe0 [ 325.155707] do_syscall_64+0x1d5/0x640 [ 325.159594] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.167280] RIP: 0033:0x45ca29 [ 325.170449] RSP: 002b:00007f207fffec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.178169] RAX: ffffffffffffffda RBX: 00000000004e18c0 RCX: 000000000045ca29 [ 325.185419] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 325.193117] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 325.200371] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 325.207635] R13: 000000000000022a R14: 00000000004c4706 R15: 00007f207ffff6d4 [ 325.214983] [ 325.216766] Allocated by task 15604: [ 325.220502] save_stack+0x32/0xa0 [ 325.223935] kasan_kmalloc+0xbf/0xe0 [ 325.227629] kmem_cache_alloc_trace+0x14d/0x7b0 [ 325.232368] do_blk_trace_setup+0x11e/0xad0 [ 325.236669] blk_trace_setup+0xa3/0x120 [ 325.240623] sg_ioctl+0x2f9/0x2620 [ 325.244142] do_vfs_ioctl+0x75a/0xfe0 [ 325.247921] SyS_ioctl+0x7f/0xb0 [ 325.251267] do_syscall_64+0x1d5/0x640 [ 325.255334] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.260504] [ 325.262114] Freed by task 15616: [ 325.265465] save_stack+0x32/0xa0 [ 325.268985] kasan_slab_free+0x75/0xc0 [ 325.272852] kfree+0xcb/0x260 [ 325.275938] blk_trace_remove+0x52/0x80 [ 325.279915] sg_ioctl+0x22a/0x2620 [ 325.283435] do_vfs_ioctl+0x75a/0xfe0 [ 325.287214] SyS_ioctl+0x7f/0xb0 [ 325.290583] do_syscall_64+0x1d5/0x640 [ 325.294456] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 325.299634] [ 325.301242] The buggy address belongs to the object at ffff88809224dc00 [ 325.301242] which belongs to the cache kmalloc-128 of size 128 [ 325.313879] The buggy address is located 64 bytes inside of [ 325.313879] 128-byte region [ffff88809224dc00, ffff88809224dc80) [ 325.325649] The buggy address belongs to the page: [ 325.330557] page:ffffea0002489340 count:1 mapcount:0 mapping:ffff88809224d000 index:0xffff88809224d6c0 [ 325.340161] flags: 0xfffe0000000100(slab) [ 325.344398] raw: 00fffe0000000100 ffff88809224d000 ffff88809224d6c0 000000010000000b [ 325.352695] raw: ffffea000283e7a0 ffffea00022173e0 ffff88812fe54640 0000000000000000 [ 325.360989] page dumped because: kasan: bad access detected [ 325.366684] [ 325.368291] Memory state around the buggy address: [ 325.373207] ffff88809224db00: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 325.380547] ffff88809224db80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 325.387973] >ffff88809224dc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 325.395514] ^ [ 325.401043] ffff88809224dc80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 325.408470] ffff88809224dd00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 325.415806] ================================================================== [ 325.423141] Disabling lock debugging due to kernel taint 20:33:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:41 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:41 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:41 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000200, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = dup(r1) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r6}, 0x14) sendto$inet6(r0, &(0x7f0000000100)="05030e3c3c003e3c00000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) 20:33:41 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) 20:33:41 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x84080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x80, 0xfd, 0x0, 0x536d950e, 0x1820a, 0xd3d851e8b9dd0f66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x3, @perf_config_ext={0x9a90, 0x2}, 0x36121, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r1 = syz_open_dev$loop(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000006ffc), 0x4) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f00000006c0)=ANY=[@ANYBLOB="a4001900", @ANYRES16=0x0, @ANYBLOB="00082abd7000fddbdf2525000000080001007063690011000200303030303a30303a31302e300000000008008b00", @ANYRESHEX, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008c0003000000080001007063690011000200303030303a30303a31302e300000000008008b00f25b91e25ef178f8ca82be4e5ef7e28347f26efd6dc54fcc17cdac62749ac4b9c77d57e162784b6f251c3088c833ac54b234ebd48d8632a1bcf8c1fc4ed90f9bf0178fe0bc03dbbce5ab065008f2f162096d29ada45e9659ca01b1d8af0a5d0ee666b5892e3f3292da0d5217aaee2294d9f23a83", @ANYRES32, @ANYBLOB="080001007063690011000200303030303a30303a31302e300000000008008b00028bbcc6cb8a0aaf78078a7b61974b362a01a9e0e332d12ad8a45f2ef54f03f6f78aa6da77e60c8a3a74c74b42a3091be0027c55b5d8cf7cfc310b5c9e29064bf2d7091ff018137c11c0bedafe11def17579d0c161ae5fa11994df02df8dadd9fbd44d06a58be4620b29f238b0b32bf0a623de39f6a84943b9a8981150c50714e186b3529dcab610354de8", @ANYRESDEC, @ANYBLOB], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0xd066711cc22749dd) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000400)="bc35312fb6780c085305926d7293ae381726ec1c2611ca1d6cdd9b1155a5f31232ea6b425e00d37f718c653c0376346ba60f37e62797727227db14360a2d90071d5fa8edfe67c8e4e83441e02acc3f2d822b272010324f4d62ac635bbbf252ae0563ce52df6e871905560ad7d3a73010298605a736d2f8c031664090f3", 0x7d) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000080)={[0xb, 0x14, 0x114], 0x2, 0x400, 0x1ff, 0x40000, 0x7}) [ 326.281151] Kernel panic - not syncing: panic_on_warn set ... [ 326.281151] [ 326.288548] CPU: 0 PID: 15604 Comm: syz-executor.3 Tainted: G B 4.14.180-syzkaller #0 [ 326.297668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.307048] Call Trace: [ 326.309645] dump_stack+0x13e/0x194 [ 326.313344] panic+0x1f9/0x42d [ 326.316541] ? add_taint.cold+0x16/0x16 [ 326.321026] ? preempt_schedule_common+0x4a/0xc0 [ 326.325788] ? do_blk_trace_setup+0xa5b/0xad0 [ 326.330287] ? ___preempt_schedule+0x16/0x18 [ 326.335060] ? do_blk_trace_setup+0xa5b/0xad0 [ 326.339584] kasan_end_report+0x43/0x49 [ 326.343562] kasan_report.cold+0x12f/0x2ae [ 326.347832] do_blk_trace_setup+0xa5b/0xad0 [ 326.352187] blk_trace_setup+0xa3/0x120 [ 326.357013] ? do_blk_trace_setup+0xad0/0xad0 [ 326.362220] ? retint_kernel+0x2d/0x2d [ 326.366089] sg_ioctl+0x2f9/0x2620 [ 326.369612] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.374347] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 326.378910] ? retint_kernel+0x2d/0x2d [ 326.382775] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 326.387446] ? sg_new_write.isra.0+0x8c0/0x8c0 [ 326.392187] do_vfs_ioctl+0x75a/0xfe0 [ 326.395969] ? selinux_file_mprotect+0x5c0/0x5c0 [ 326.400711] ? ioctl_preallocate+0x1a0/0x1a0 [ 326.405111] ? security_file_ioctl+0x76/0xb0 [ 326.409500] ? security_file_ioctl+0x83/0xb0 [ 326.413890] SyS_ioctl+0x7f/0xb0 [ 326.417330] ? do_vfs_ioctl+0xfe0/0xfe0 [ 326.421637] do_syscall_64+0x1d5/0x640 [ 326.425699] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 326.430881] RIP: 0033:0x45ca29 [ 326.434138] RSP: 002b:00007f207fffec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.441829] RAX: ffffffffffffffda RBX: 00000000004e18c0 RCX: 000000000045ca29 [ 326.449078] RDX: 0000000020000080 RSI: 00000000c0481273 RDI: 0000000000000005 [ 326.456334] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.463587] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 326.470924] R13: 000000000000022a R14: 00000000004c4706 R15: 00007f207ffff6d4 [ 326.478925] Kernel Offset: disabled [ 326.482645] Rebooting in 86400 seconds..