[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 26.814707] kauditd_printk_skb: 7 callbacks suppressed [ 26.814719] audit: type=1800 audit(1540964851.949:29): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 26.845067] audit: type=1800 audit(1540964851.949:30): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2018/10/31 05:47:55 fuzzer started 2018/10/31 05:47:57 dialing manager at 10.128.0.26:44671 2018/10/31 05:48:05 syscalls: 1 2018/10/31 05:48:05 code coverage: enabled 2018/10/31 05:48:05 comparison tracing: enabled 2018/10/31 05:48:05 setuid sandbox: enabled 2018/10/31 05:48:05 namespace sandbox: enabled 2018/10/31 05:48:05 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/31 05:48:05 fault injection: enabled 2018/10/31 05:48:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/31 05:48:05 net packed injection: enabled 2018/10/31 05:48:05 net device setup: enabled 05:50:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) syzkaller login: [ 216.343243] IPVS: ftp: loaded support on port[0] = 21 05:50:41 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4006, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x2, 0x4) sendto$inet6(r0, &(0x7f00000002c0)="050100000500000000000000ffa2ada33f93820fd903378c39160aaacb57a80000067d0004000033e3c2e772a249563dd86e4a58611537a0bec2d5e9f6aa000b7a0e4263262e625ef7402810fadc5712f29508c008e265756fe5eb8f5972eaecfffc2bd906aba5568a122a38d18df6f3de816cbce99032140d83ee743bdd", 0x7e, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x8000000000005, @dev}, 0x1c) [ 216.615323] IPVS: ftp: loaded support on port[0] = 21 05:50:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000000000000d000040050000a900000000000000000000004000000000010000000000000025000000fff0ffff04040000000000000a00000006"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x6, 0x0, [{0x390}]}) [ 216.830239] IPVS: ftp: loaded support on port[0] = 21 05:50:42 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)="7005000000000000007f00000000000000000002000000bbafec69ee414d367c0b9052dde65b73a585aede12e5ead1b453245a28c3", 0x275a, 0x0) write(r1, &(0x7f0000000340)="a4", 0x1) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)=0x4000) [ 217.447844] IPVS: ftp: loaded support on port[0] = 21 05:50:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x7, &(0x7f0000013e95), 0x4) close(r2) close(r1) [ 218.001495] IPVS: ftp: loaded support on port[0] = 21 [ 218.076880] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.096798] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.112388] device bridge_slave_0 entered promiscuous mode [ 218.251815] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.258499] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.268854] device bridge_slave_1 entered promiscuous mode 05:50:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000400)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 218.395129] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.401686] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.422042] device bridge_slave_0 entered promiscuous mode [ 218.438242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.538386] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.561837] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.591668] device bridge_slave_1 entered promiscuous mode [ 218.598404] IPVS: ftp: loaded support on port[0] = 21 [ 218.609285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.727516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 218.742339] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.748711] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.757753] device bridge_slave_0 entered promiscuous mode [ 218.826148] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 218.899615] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.908152] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.916029] device bridge_slave_1 entered promiscuous mode [ 219.065717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.098707] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.211827] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.232604] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.250422] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.382631] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.536322] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.559045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.614054] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.637466] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.661688] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.669104] device bridge_slave_0 entered promiscuous mode [ 219.694585] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 219.701800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.767499] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.885699] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.892244] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.899587] device bridge_slave_1 entered promiscuous mode [ 219.911052] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.934999] team0: Port device team_slave_0 added [ 219.946133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.968644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.016411] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.038989] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.063097] team0: Port device team_slave_1 added [ 220.157511] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 220.177139] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.202451] team0: Port device team_slave_0 added [ 220.210369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.332614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.341364] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.369779] team0: Port device team_slave_1 added [ 220.437761] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.455946] team0: Port device team_slave_0 added [ 220.473864] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.484092] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.494464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.534434] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.542161] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.550210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.584026] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.590419] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.600831] device bridge_slave_0 entered promiscuous mode [ 220.612477] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.635573] team0: Port device team_slave_1 added [ 220.654067] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.666359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.704463] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.711004] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.727483] device bridge_slave_1 entered promiscuous mode [ 220.735424] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.750583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.765937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.782272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.796537] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.806313] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 220.815833] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.822690] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.830052] device bridge_slave_0 entered promiscuous mode [ 220.841185] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.864121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.872190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.880132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.912378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.929185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.944193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.957388] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 220.969187] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.977908] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.985989] device bridge_slave_1 entered promiscuous mode [ 221.001153] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.032014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.039993] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.058194] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.073751] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.083515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.091362] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.108129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.140212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.152192] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.179675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.192454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.203530] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.221693] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.281454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.293833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.301313] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.310490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.473032] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.634289] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.672182] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.682560] team0: Port device team_slave_0 added [ 221.693441] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.767098] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.786991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.812146] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.832453] team0: Port device team_slave_1 added [ 221.842407] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.906938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.916316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.943939] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.954787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.999843] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.031450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.041380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.157778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.195631] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.202167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.209172] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.215610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.234061] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.273943] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 222.288794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.312418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.379953] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.396082] team0: Port device team_slave_0 added [ 222.405336] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 222.432327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.440403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.501734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.582540] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 222.592191] team0: Port device team_slave_0 added [ 222.600428] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.613171] team0: Port device team_slave_1 added [ 222.727818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 222.735440] team0: Port device team_slave_1 added [ 222.743728] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.756345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.768751] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.815742] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.822184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.828870] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.835300] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.843521] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.855731] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.862150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.868809] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.875252] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.884847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 222.893920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.903134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.910004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.920302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.962347] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.986167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.016135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.033460] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.043163] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.072389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.079262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.092314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.155946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.172103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.183380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.226003] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 223.245213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.255660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.342026] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 223.349233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.366760] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.522058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.542417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.954198] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.960606] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.967345] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.973757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.985233] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.531675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.575298] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.581730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.588397] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.594830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.628297] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 224.802269] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.808679] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.815390] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.821803] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.851847] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 225.592065] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.612368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.584200] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.837637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.034719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.126843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.231287] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.539096] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.549166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 228.558282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.572330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.740811] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 228.770670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.786909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.045255] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.070526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.095525] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.125980] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.157037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.240648] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.551949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 229.627922] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.791521] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.923090] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 229.930925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.952599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.116905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.270002] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.372833] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.593938] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 230.760515] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 230.782212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.789491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.105715] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.118921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.132402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.246384] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.592660] 8021q: adding VLAN 0 to HW filter on device team0 05:50:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='lp\x00', 0x3) [ 232.221786] hrtimer: interrupt took 29618 ns 05:50:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) [ 232.306266] mmap: syz-executor1 (7156) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 05:50:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) [ 232.582311] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 05:50:57 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) 05:50:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) 05:50:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='lp\x00', 0x3) 05:50:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f00000000c0)="c4824da82b66ba2100b801000000efb9270900000f323640a7650f30c4e2899c8e02000000f02046452ef3440f6fb800f0ff7fc42101dbc40f2047", 0x3b}], 0x1, 0x0, &(0x7f0000000080), 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000001e00fb034d564b0000000001"]) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4188aea7, &(0x7f00000001c0)={0x2, 0x0, [0x490, 0x0, 0xc0010140]}) 05:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) 05:50:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x0, &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) 05:50:58 executing program 3: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 4: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 5: getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000000000024000000f4134333e56262cc0867a8352752ccc4abe40950e09314602868302ddddd465fbbf842da"], &(0x7f0000000140)=0x1) r0 = memfd_create(&(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0) write$eventfd(r0, &(0x7f0000000240), 0x19c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, &(0x7f0000000040)) 05:50:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f25df5cf1cdd8b5500000007000000", 0x10) 05:50:59 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84308910000003900080002000c00060000001900a30704000000000000dc1338346b00009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000180)}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 05:50:59 executing program 3: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='lp\x00', 0x3) [ 234.274729] IPv6: Can't replace route, no match found 05:50:59 executing program 3: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000700)=[@in={0x2, 0x0, @remote}], 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000662000), 0x4) mmap(&(0x7f0000aba000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000aca000)={0x0, 0x10, "8252cc7051f5e05e71ee63b76f6c3c92"}, &(0x7f0000abaffc)=0x18) [ 234.352743] IPv6: Can't replace route, no match found 05:50:59 executing program 4: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 2: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f00000001c0)="650fc75c276766b882000f00d0c4423d3c56eef22ede9a002000000f01cf0f3042802100660f38802afb0f23d4", 0x2d}], 0x1, 0xffffffffffffffff, &(0x7f0000000040), 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000001000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000300)="450f09660f72d1ed0f01cfc443f909dca8c74424000d010000c7442402bc330000ff2c2466460f388044830f3e67420ff1ad0055000048b841000000000000000f23d80f21f835400000700f23f8470f01ca470f07"}], 0x1, 0x0, &(0x7f0000000180), 0x1062) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:50:59 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x80123, 0x4}) 05:50:59 executing program 3: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 4: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001f40)={&(0x7f0000000000), 0xc, &(0x7f0000001f00)={&(0x7f0000001b00)={0x14, r1, 0x22d}, 0x14}}, 0x0) 05:50:59 executing program 5: syslog(0x9, &(0x7f00000002c0)=""/93, 0x5d) r0 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0x100000000, 0x2) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc8070031") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7087, 0x2) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip6_tables_targets\x00') ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x800) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00000000000000.0000000'], 0x1, 0x0) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) read(r4, &(0x7f0000000040)=""/11, 0xfffffffffffffd5d) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) close(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_dgram(r2, &(0x7f00000004c0)={0x28, 0x0, 0x0, @reserved}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r5}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r6 = memfd_create(&(0x7f0000000140)='\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4000020005) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x38eb3ca89b8bdd00}, 0x10) r8 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000480)='group_id', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r8) bind$netlink(r1, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) dup2(r7, r6) 05:51:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f25df5cf1cdd8b5500000007000000", 0x10) 05:51:00 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 05:51:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0), 0x1, 0x2000000000002) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001100)='lp\x00', 0x3) 05:51:00 executing program 2: r0 = socket(0x1e, 0x804, 0x0) connect$llc(r0, &(0x7f00000000c0)={0x1e, 0x303}, 0x10) 05:51:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000640), 0x40000000000029b, 0x0) 05:51:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f25df5cf1cdd8b5500000007000000", 0x10) 05:51:00 executing program 5: syslog(0x9, &(0x7f00000002c0)=""/93, 0x5d) r0 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0x100000000, 0x2) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc8070031") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7087, 0x2) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip6_tables_targets\x00') ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x800) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00000000000000.0000000'], 0x1, 0x0) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) read(r4, &(0x7f0000000040)=""/11, 0xfffffffffffffd5d) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) close(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_dgram(r2, &(0x7f00000004c0)={0x28, 0x0, 0x0, @reserved}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r5}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r6 = memfd_create(&(0x7f0000000140)='\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4000020005) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x38eb3ca89b8bdd00}, 0x10) r8 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000480)='group_id', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r8) bind$netlink(r1, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) dup2(r7, r6) 05:51:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x28) 05:51:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000001540)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f25df5cf1cdd8b5500000007000000", 0x10) 05:51:01 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xc, 0x5) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000040)={0x80323}) 05:51:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) [ 235.949933] vhci_hcd: invalid port number 0 05:51:01 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup2(r0, r1) socket$inet(0x2, 0x2, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}}}}}}, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000200)) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000001740)={'nat\x00', 0x0, 0x0, 0x0, [], 0x11c, &(0x7f0000000300)}, 0x78) 05:51:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000640), 0x40000000000029b, 0x0) 05:51:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f00000000c0)=0x2000002, 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r2 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000100)=0xff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x8400, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x9) ioctl$KDSETLED(r0, 0x4b32, 0x4) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000240)=0x3, 0x4) r3 = socket(0xa, 0x2, 0x0) ioctl(r3, 0x9, &(0x7f0000000200)="2894ba9157f2fd7464231bc335c80ab46311209daf180bd969256196f49435468f5d906c") ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x2, {0x2, 0x0, @broadcast}, 'bond_slave_1\x00'}) setsockopt$inet6_tcp_int(r2, 0x6, 0x19, &(0x7f000074fffc), 0xb73d37fda2d17bc9) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000380)={0x7f, 0x5, 0x1fffe000, 0x101, 0x6, 0x8}) r4 = dup(r2) setsockopt$inet6_tcp_int(r4, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0xfffffffffffffffe, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000480)='bbr\x00', 0x4) sendfile(r4, r3, &(0x7f0000000000), 0x4b5) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000040)=0x0) fcntl$setown(r3, 0x8, r5) ioctl$KDSETLED(r4, 0x4b32, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x1ff) fcntl$addseals(r3, 0x409, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r6 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x7fff) sendfile(r4, r6, &(0x7f0000d83ff8)=0x6, 0x8000fffffffe) 05:51:02 executing program 5: syslog(0x9, &(0x7f00000002c0)=""/93, 0x5d) r0 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0x100000000, 0x2) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc8070031") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7087, 0x2) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip6_tables_targets\x00') ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x800) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00000000000000.0000000'], 0x1, 0x0) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) read(r4, &(0x7f0000000040)=""/11, 0xfffffffffffffd5d) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) close(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_dgram(r2, &(0x7f00000004c0)={0x28, 0x0, 0x0, @reserved}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r5}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r6 = memfd_create(&(0x7f0000000140)='\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4000020005) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x38eb3ca89b8bdd00}, 0x10) r8 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000480)='group_id', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r8) bind$netlink(r1, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) dup2(r7, r6) 05:51:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000640), 0x40000000000029b, 0x0) 05:51:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) [ 237.334204] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:51:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmmsg(r0, &(0x7f0000000640), 0x40000000000029b, 0x0) 05:51:02 executing program 5: syslog(0x9, &(0x7f00000002c0)=""/93, 0x5d) r0 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0x100000000, 0x2) ioctl(r0, 0x0, &(0x7f0000000280)="0a5cc8070031") r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7087, 0x2) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000540)='net/ip6_tables_targets\x00') ioctl$KVM_GET_SREGS(r3, 0x8138ae83, &(0x7f0000000580)) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000280)=0x800) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00000000000000.0000000'], 0x1, 0x0) r4 = socket$bt_bnep(0x1f, 0x3, 0x4) read(r4, &(0x7f0000000040)=""/11, 0xfffffffffffffd5d) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) close(r2) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$vsock_dgram(r2, &(0x7f00000004c0)={0x28, 0x0, 0x0, @reserved}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ppoll(&(0x7f00000001c0)=[{r5}], 0x2000000000000127, &(0x7f0000000240)={0x77359400}, &(0x7f0000001340), 0x8) umount2(&(0x7f0000000140)='./file0\x00', 0x0) r6 = memfd_create(&(0x7f0000000140)='\x00', 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x4000020005) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x38eb3ca89b8bdd00}, 0x10) r8 = request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000480)='group_id', 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r8) bind$netlink(r1, &(0x7f0000000500)={0x10, 0x0, 0x25dfdbfe, 0x40000}, 0xc) dup2(r7, r6) 05:51:02 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffd3b, &(0x7f0000000140)=0x40000000010009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001580)=""/35) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000580)=""/4096) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, 0x0) tkill(r2, 0x401104000000016) 05:51:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="00bc065bca180a6e54cec91df0a42fff085d878df3f85a0f069908eb2bb1000acdcc499347e31612e80a9f1034903c3ffe94000000f34669e42c8ff518a55c923bd83428b19f06ea0ad3744822b7dc9494ffffffc9ca7f991dc24ab0c2775d2e10955895bc000000008736b584eb92fb7f27eb4bc3afbae09e854abafebd36b924a0524c53a267e45f5731f96ebde59df0b83acfdae902d1d2d9d8ebd2fbe5a00a7e7b8c5c197f91d065d67847b82d1c6edf482ccbf19922db201efd890e96e8eb7f8d33ce1d4df81273431cc619bb4c36dedfd54f555f460f633b60c1308ff87c1c4ddd1bbc1162e846c0f87efa65ab2b31de6a772e8f8bcc84eab88b64faaacd4d4b1b088b57565e187e72af19dcad319301d37c36fdc98ac0b1159966877af3b1ae8ffef97d2df8b19db2c96f1dacb680d68a9a3d11e8f0ef8b5dc4fd20863d27725b34a246d662d98c446b896ce49186f8225d9b562659d7992705abbf"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) 05:51:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="00bc065bca180a6e54cec91df0a42fff085d878df3f85a0f069908eb2bb1000acdcc499347e31612e80a9f1034903c3ffe94000000f34669e42c8ff518a55c923bd83428b19f06ea0ad3744822b7dc9494ffffffc9ca7f991dc24ab0c2775d2e10955895bc000000008736b584eb92fb7f27eb4bc3afbae09e854abafebd36b924a0524c53a267e45f5731f96ebde59df0b83acfdae902d1d2d9d8ebd2fbe5a00a7e7b8c5c197f91d065d67847b82d1c6edf482ccbf19922db201efd890e96e8eb7f8d33ce1d4df81273431cc619bb4c36dedfd54f555f460f633b60c1308ff87c1c4ddd1bbc1162e846c0f87efa65ab2b31de6a772e8f8bcc84eab88b64faaacd4d4b1b088b57565e187e72af19dcad319301d37c36fdc98ac0b1159966877af3b1ae8ffef97d2df8b19db2c96f1dacb680d68a9a3d11e8f0ef8b5dc4fd20863d27725b34a246d662d98c446b896ce49186f8225d9b562659d7992705abbf"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) [ 237.917033] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:51:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) 05:51:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 05:51:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x4, 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x400000000000224, 0x0) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1"], 0x75}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x400000011, 0x100000000000002, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r2, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000017c0)='./file0\x00', 0x0, 0x0) 05:51:03 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) 05:51:03 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffd3b, &(0x7f0000000140)=0x40000000010009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001580)=""/35) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000580)=""/4096) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, 0x0) tkill(r2, 0x401104000000016) 05:51:03 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) 05:51:03 executing program 5: mkdir(&(0x7f0000000180)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000200)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000040)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mkdir(&(0x7f0000000880)='./file0\x00', 0x0) unlink(&(0x7f00000000c0)='./control/file0\x00') rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./control\x00') mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000280)='./control\x00', &(0x7f00000003c0)='fuseblk\x00', 0x2000, &(0x7f0000000540)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) close(r0) [ 238.588373] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:51:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000040)="0a5c2d02402b6285717070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80200000000002, &(0x7f0000000680)=0x82, 0x4) readv(0xffffffffffffffff, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/36, 0x24}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x10000000000443) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0xff) setsockopt$inet6_int(r3, 0x29, 0x7b, &(0x7f0000000340)=0xa32, 0xfc5c) r4 = socket(0xa, 0x0, 0x0) ioctl(r4, 0x0, &(0x7f0000000240)="2894ba9157f2fd7464231bc335c80ab46311") ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000440)={@local}) r5 = dup(r3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x200000000007ffff, 0x0) r8 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r7, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r8, 0x8, 0x2, 'syz1\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x530, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000940)=0xffffffffffffffc9) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) r9 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r9, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(r5, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0xffffffffffffff92) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000001c0)={r10, @loopback, @rand_addr=0x1cb}, 0xc) 05:51:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$kcm(0x29, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)}]) syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x0, 0x181002) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 05:51:04 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000cc0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000980)='./file0\x00', &(0x7f0000000d40)='jfs\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x80000) [ 239.221917] block nbd5: Attempted send on invalid socket [ 239.227840] print_req_error: I/O error, dev nbd5, sector 64 [ 239.244389] block nbd5: Attempted send on invalid socket [ 239.249923] print_req_error: I/O error, dev nbd5, sector 120 [ 239.257579] block nbd5: Attempted send on invalid socket [ 239.263424] print_req_error: I/O error, dev nbd5, sector 64 05:51:04 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002e40)={0x12, 0xb9, 0x4, 0x74}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140), 0x2}, 0x20) 05:51:04 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0x5, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [], {0x0, 0x1c9c380}}) [ 239.269527] block nbd5: Attempted send on invalid socket [ 239.275132] print_req_error: I/O error, dev nbd5, sector 120 05:51:04 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000cc0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000980)='./file0\x00', &(0x7f0000000d40)='jfs\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x80000) 05:51:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000200), &(0x7f0000000240)}}, &(0x7f00000002c0)) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) r1 = gettid() ioctl$int_in(r0, 0x80000080045005, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, &(0x7f0000001680)) tkill(r1, 0x15) 05:51:04 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffd3b, &(0x7f0000000140)=0x40000000010009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001580)=""/35) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000580)=""/4096) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, 0x0) tkill(r2, 0x401104000000016) [ 239.456173] block nbd5: Attempted send on invalid socket [ 239.461820] print_req_error: I/O error, dev nbd5, sector 64 [ 239.469040] block nbd5: Attempted send on invalid socket [ 239.474624] print_req_error: I/O error, dev nbd5, sector 120 05:51:04 executing program 4: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x4, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x0, 0x1, 0x0, [], &(0x7f0000000080)={0x98f909, 0xfffffffffffffffd, [], @p_u32=&(0x7f0000000100)}}) 05:51:04 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000cc0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000980)='./file0\x00', &(0x7f0000000d40)='jfs\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x80000) 05:51:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = gettid() socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x8) wait4(0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)) [ 239.684134] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:51:04 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000001c0)=[@register_looper, @enter_looper], 0xfdfdffff, 0x0, &(0x7f0000000240)}) [ 239.737215] block nbd5: Attempted send on invalid socket [ 239.742836] print_req_error: I/O error, dev nbd5, sector 64 [ 239.751472] block nbd5: Attempted send on invalid socket [ 239.757160] print_req_error: I/O error, dev nbd5, sector 120 05:51:04 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f0000000cc0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000980)='./file0\x00', &(0x7f0000000d40)='jfs\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000940)='/dev/input/mice\x00', 0x0, 0x80000) [ 239.934009] binder: 7576:7577 ERROR: BC_REGISTER_LOOPER called without request [ 239.960296] binder: 7576:7577 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 239.969385] block nbd5: Attempted send on invalid socket [ 239.975129] print_req_error: I/O error, dev nbd5, sector 64 05:51:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$kcm(0x29, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)}]) syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x0, 0x181002) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) [ 239.982710] block nbd5: Attempted send on invalid socket [ 239.988312] print_req_error: I/O error, dev nbd5, sector 120 05:51:05 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000001c0)=[@register_looper, @enter_looper], 0xfdfdffff, 0x0, &(0x7f0000000240)}) [ 240.126085] binder: 7585:7586 ERROR: BC_REGISTER_LOOPER called without request [ 240.140126] binder: 7585:7586 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER 05:51:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="67440fecd02e3e0fc79be701000066baf80cb8cf8afe87ef66bafc0cecf00fb331c744240070de68c1c744240200000000c7442406000000000f011c24460fc7afab31537ac74424000d000000c7442402a9e84181ff2c243664990f9fa430dcd065cab93a0a00000f32", 0x6a}], 0x1, 0x0, &(0x7f0000000180), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='/dev/kvm\x00'}, 0x10) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:05 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000001c0)=[@register_looper, @enter_looper], 0xfdfdffff, 0x0, &(0x7f0000000240)}) [ 240.286355] binder: 7593:7594 ERROR: BC_REGISTER_LOOPER called without request [ 240.334731] binder: 7593:7594 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 240.430651] kvm: emulating exchange as write 05:51:05 executing program 2: shmctl$IPC_RMID(0x0, 0xffffffffff030000) 05:51:05 executing program 0: sched_setaffinity(0x0, 0xfffffffffffffd3b, &(0x7f0000000140)=0x40000000010009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(0xffffffffffffffff, 0x8008ae9d, &(0x7f0000001580)=""/35) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000540)='yeah\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0x0, 0xea03000000000000, 0x50000ff0f0000, 0x0, 0x0, 0x0, 0xd9050000]}}, 0x1c) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000580)=""/4096) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000180)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) prctl$setptracer(0x59616d61, 0x0) tkill(r2, 0x401104000000016) 05:51:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:05 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0xffffffffffffffff, 0x806) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x8, 0x0, &(0x7f00000001c0)=[@register_looper, @enter_looper], 0xfdfdffff, 0x0, &(0x7f0000000240)}) 05:51:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:05 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x80044df9, &(0x7f00000001c0)) [ 240.662865] binder: 7617:7618 ERROR: BC_REGISTER_LOOPER called without request [ 240.669906] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 240.681789] binder: 7617:7618 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER 05:51:05 executing program 4: clock_getres(0x5, &(0x7f0000000040)) 05:51:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$kcm(0x29, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)}]) syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x0, 0x181002) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 05:51:06 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000000001fd, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) open(&(0x7f0000000380)='./bus\x00', 0x47f, 0x40) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x111) prlimit64(0x0, 0x6, &(0x7f0000000100), &(0x7f0000000140)) setresuid(r2, 0x0, 0x0) prlimit64(0x0, 0x6, &(0x7f00000000c0)={0x3, 0x7f26}, &(0x7f0000000180)) execve(&(0x7f0000000080)='./bus\x00', &(0x7f0000000400), &(0x7f0000000440)=[&(0x7f0000000240)='-\x00', &(0x7f0000000280)='*]{trusted-\x00', &(0x7f0000000300)="508a00", &(0x7f0000000340)=',\x00']) 05:51:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:06 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local={[0x13]}, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x30}, @dev}, @icmp=@parameter_prob={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 05:51:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000bfcffc), &(0x7f0000000100)=0xfc4d) 05:51:06 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)={0x0, 0x0}) chdir(&(0x7f00000000c0)='./file0\x00') capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x40000000000000b, 0x0) 05:51:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) [ 241.249410] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 05:51:06 executing program 0: syz_mount_image$xfs(&(0x7f0000000100)='xfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000000)={[{@logbufs={'logbufs', 0x3d, 0x1}}]}) 05:51:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) dup3(r2, r1, 0x0) 05:51:06 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001400)=""/168, 0xa8}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) close(r2) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r2}) 05:51:06 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000380)={0x0, 0x0, 0x2, {0x1, @sliced}}) [ 241.361395] XFS (loop0): invalid logbufs value: 1 [not 2-8] [ 241.441034] XFS (loop0): invalid logbufs value: 1 [not 2-8] 05:51:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) socket$kcm(0x29, 0x7, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) io_submit(0x0, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f000079a000)}]) syz_open_dev$usbmon(&(0x7f0000000740)='/dev/usbmon#\x00', 0x0, 0x181002) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 05:51:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$BLKGETSIZE64(r1, 0x127b, &(0x7f0000001400)) 05:51:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="bad004b8c0abef2e360f0966b9cc0a00000f3266b8010000000f01c12e0f22420fc7a814590fc72d650f00d1670fae0af30f209c", 0x34}], 0x1, 0x0, &(0x7f0000000100), 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0xca, 0x0, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:06 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x368, 0x6d, &(0x7f0000000080), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f00008deff8), &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 05:51:06 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000002c0)={@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "69f3ac6c41d8d1a764d88bc3db5010c00c40a5a2eb027c71984ea92c588138a45590a743a158e746e04db5da27081c7851c59ba0eddfaa1f1c9e835e595a98"}, {&(0x7f0000000580)=""/233, 0xe9}, &(0x7f0000000680)}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) io_setup(0x100000001, &(0x7f0000000040)) [ 241.634228] syz-executor1 (7635) used greatest stack depth: 15200 bytes left [ 241.800780] kvm: pic: non byte write [ 241.825353] kvm: pic: non byte write [ 241.838637] kvm: pic: non byte write [ 241.848716] kvm: pic: non byte write [ 241.880294] kvm: pic: non byte write [ 241.900246] kvm: pic: non byte write [ 241.941313] kvm: pic: non byte write [ 241.966199] kvm: pic: non byte write [ 242.001184] kvm: pic: non byte write [ 242.033619] kvm: pic: non byte write 05:51:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$BLKGETSIZE64(r1, 0x127b, &(0x7f0000001400)) 05:51:07 executing program 1: perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:51:07 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000002c0)={@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "69f3ac6c41d8d1a764d88bc3db5010c00c40a5a2eb027c71984ea92c588138a45590a743a158e746e04db5da27081c7851c59ba0eddfaa1f1c9e835e595a98"}, {&(0x7f0000000580)=""/233, 0xe9}, &(0x7f0000000680)}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) io_setup(0x100000001, &(0x7f0000000040)) [ 242.469539] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:51:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$BLKGETSIZE64(r1, 0x127b, &(0x7f0000001400)) 05:51:07 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, "d24867de5bdd032be86e073db2eccb959e8fee0ea444fbb03a176fb6e53b456df5b13162a55cbdd8dd95b480"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "506d4b95d0d6c48bf01a1a8402a61439529e3b64e553152146896ba6d0c596e413e633507a3ec693358f4371628a44a2cc2c91257fcdc9ebd59d9ef08653a01d", &(0x7f0000000040)}) 05:51:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="bad004b8c0abef2e360f0966b9cc0a00000f3266b8010000000f01c12e0f22420fc7a814590fc72d650f00d1670fae0af30f209c", 0x34}], 0x1, 0x0, &(0x7f0000000100), 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0xca, 0x0, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:07 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, "d24867de5bdd032be86e073db2eccb959e8fee0ea444fbb03a176fb6e53b456df5b13162a55cbdd8dd95b480"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "506d4b95d0d6c48bf01a1a8402a61439529e3b64e553152146896ba6d0c596e413e633507a3ec693358f4371628a44a2cc2c91257fcdc9ebd59d9ef08653a01d", &(0x7f0000000040)}) 05:51:08 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, "d24867de5bdd032be86e073db2eccb959e8fee0ea444fbb03a176fb6e53b456df5b13162a55cbdd8dd95b480"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "506d4b95d0d6c48bf01a1a8402a61439529e3b64e553152146896ba6d0c596e413e633507a3ec693358f4371628a44a2cc2c91257fcdc9ebd59d9ef08653a01d", &(0x7f0000000040)}) 05:51:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="bad004b8c0abef2e360f0966b9cc0a00000f3266b8010000000f01c12e0f22420fc7a814590fc72d650f00d1670fae0af30f209c", 0x34}], 0x1, 0x0, &(0x7f0000000100), 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0xca, 0x0, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:08 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, "d24867de5bdd032be86e073db2eccb959e8fee0ea444fbb03a176fb6e53b456df5b13162a55cbdd8dd95b480"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "506d4b95d0d6c48bf01a1a8402a61439529e3b64e553152146896ba6d0c596e413e633507a3ec693358f4371628a44a2cc2c91257fcdc9ebd59d9ef08653a01d", &(0x7f0000000040)}) 05:51:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$BLKGETSIZE64(r1, 0x127b, &(0x7f0000001400)) 05:51:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:08 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000200)={0x1c, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {}, [@nested={0x8, 0x12, [@generic="04"]}]}, 0x1c}}, 0x0) 05:51:08 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000002c0)={@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "69f3ac6c41d8d1a764d88bc3db5010c00c40a5a2eb027c71984ea92c588138a45590a743a158e746e04db5da27081c7851c59ba0eddfaa1f1c9e835e595a98"}, {&(0x7f0000000580)=""/233, 0xe9}, &(0x7f0000000680)}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) io_setup(0x100000001, &(0x7f0000000040)) 05:51:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1400, &(0x7f0000000040), 0x98) [ 243.297141] netlink: 'syz-executor1': attribute type 18 has an invalid length. 05:51:08 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1400, &(0x7f0000000040), 0x98) 05:51:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000e77fff), 0x2bd, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) sendto$inet6(r0, &(0x7f0000000140)="05af41f6757ff8b0b6b92900aa3e8051ed8294251434fed88c624b4eb7dd58ea092c7a88a5e79634c1234b6564bb7b06a2f89c0b68fe240e40cdebeb01bce95b30d5d5d99ec373d5c93b044e83183d0d14e37b737669930a15adc55318057ce85143365ec177e2cafca4db58b9ce0b743c2b8585561322e36b1b4be5575e8fd8f384ea443e773f958da5e316962c1f4311647b9c426476c49dd4821daf171313e66e9a5a900c235f2fdde52c12404f38e73876e37db2d12029dbba3deb0251eed1f7313b76", 0xc5, 0x8040, 0x0, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0x8) ftruncate(r1, 0x80003) sendfile(r0, r1, &(0x7f00000000c0), 0x800000000053) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000240)=0x9) 05:51:08 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1400, &(0x7f0000000040), 0x98) 05:51:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x24}, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 05:51:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="bad004b8c0abef2e360f0966b9cc0a00000f3266b8010000000f01c12e0f22420fc7a814590fc72d650f00d1670fae0af30f209c", 0x34}], 0x1, 0x0, &(0x7f0000000100), 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0xca, 0x0, 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@textreal={0x8, &(0x7f00000003c0)="66b8410000000f23c80f21f86635080040000f23f8ba4300edf390baf80c66b8186f4a8666efbafc0c66b88d3f000066ef66b9e402000066b80080000066ba000000000f3066b9760100000f32b800008ec00f01c90f2202f3650f011b", 0x5d}], 0x1, 0x0, &(0x7f00000003c0), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:09 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1400, &(0x7f0000000040), 0x98) 05:51:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 4: setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f00000002c0)={@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "69f3ac6c41d8d1a764d88bc3db5010c00c40a5a2eb027c71984ea92c588138a45590a743a158e746e04db5da27081c7851c59ba0eddfaa1f1c9e835e595a98"}, {&(0x7f0000000580)=""/233, 0xe9}, &(0x7f0000000680)}, 0xa0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) io_setup(0x100000001, &(0x7f0000000040)) 05:51:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966aab4d9783f1ba36e852559977fdff81769f02b0d480541b2a9ac71841de8ad68c806b99761103a5ea7d63a4efd71593151b2e0dfdd2ec53091844510b7c913a72835b237d19d201654f1a8cab1a8ac2e2e37aac7fa7c10377f90200bc04487aedc86a0c75b2b5263f7b7df57de10ff2a988aade0eb99c44750757131f7d3b1ecded4cbe9ebe6d2a6b4e045f4190b4c8cd7105a524e29ecc08088dbb0017087125a0240a024cc46fccaab8ecaa7fd7273ee7e8e5692756832eed581d8e1d0ef425f83f9d449513f47b7bc9f1ea52441599a49686bda6524284c5a7cac38359658b713fd4cf81322ad880745be35ed66340691fc41422e523a30f77c6ae0a15bc4d0a2034cf87ca261700dbc5da76448c5c7fed5e3dc21e53187b025a89f1f6ff96920a684adf7266319cabe73561897cbbf3dd0c9b11837ab44a08d143fa2506d2383df4586573e77829062046f04261d9c481c2411d8053b16edaad812bce6bfb57e05c14b580f78b9977b110e7b0a6a5199899bb530796dc89778ebafa40ceb55c8d0ac5b6a0b7b16cda39c553d4eb99d75605c3a4ec27640c1208bed39caafe977ee8977e0569352e64c7b7aae67b564081072dae7c9dd377e4b634696bc108c3e27ca6e23ddd2d95fc"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966aab4d9783f1ba36e852559977fdff81769f02b0d480541b2a9ac71841de8ad68c806b99761103a5ea7d63a4efd71593151b2e0dfdd2ec53091844510b7c913a72835b237d19d201654f1a8cab1a8ac2e2e37aac7fa7c10377f90200bc04487aedc86a0c75b2b5263f7b7df57de10ff2a988aade0eb99c44750757131f7d3b1ecded4cbe9ebe6d2a6b4e045f4190b4c8cd7105a524e29ecc08088dbb0017087125a0240a024cc46fccaab8ecaa7fd7273ee7e8e5692756832eed581d8e1d0ef425f83f9d449513f47b7bc9f1ea52441599a49686bda6524284c5a7cac38359658b713fd4cf81322ad880745be35ed66340691fc41422e523a30f77c6ae0a15bc4d0a2034cf87ca261700dbc5da76448c5c7fed5e3dc21e53187b025a89f1f6ff96920a684adf7266319cabe73561897cbbf3dd0c9b11837ab44a08d143fa2506d2383df4586573e77829062046f04261d9c481c2411d8053b16edaad812bce6bfb57e05c14b580f78b9977b110e7b0a6a5199899bb530796dc89778ebafa40ceb55c8d0ac5b6a0b7b16cda39c553d4eb99d75605c3a4ec27640c1208bed39caafe977ee8977e0569352e64c7b7aae67b564081072dae7c9dd377e4b634696bc108c3e27ca6e23ddd2d95fc"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966aab4d9783f1ba36e852559977fdff81769f02b0d480541b2a9ac71841de8ad68c806b99761103a5ea7d63a4efd71593151b2e0dfdd2ec53091844510b7c913a72835b237d19d201654f1a8cab1a8ac2e2e37aac7fa7c10377f90200bc04487aedc86a0c75b2b5263f7b7df57de10ff2a988aade0eb99c44750757131f7d3b1ecded4cbe9ebe6d2a6b4e045f4190b4c8cd7105a524e29ecc08088dbb0017087125a0240a024cc46fccaab8ecaa7fd7273ee7e8e5692756832eed581d8e1d0ef425f83f9d449513f47b7bc9f1ea52441599a49686bda6524284c5a7cac38359658b713fd4cf81322ad880745be35ed66340691fc41422e523a30f77c6ae0a15bc4d0a2034cf87ca261700dbc5da76448c5c7fed5e3dc21e53187b025a89f1f6ff96920a684adf7266319cabe73561897cbbf3dd0c9b11837ab44a08d143fa2506d2383df4586573e77829062046f04261d9c481c2411d8053b16edaad812bce6bfb57e05c14b580f78b9977b110e7b0a6a5199899bb530796dc89778ebafa40ceb55c8d0ac5b6a0b7b16cda39c553d4eb99d75605c3a4ec27640c1208bed39caafe977ee8977e0569352e64c7b7aae67b564081072dae7c9dd377e4b634696bc108c3e27ca6e23ddd2d95fc"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6000) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000140)={0x2, "7665746831000000000000001100", 0x4}, 0x18) r1 = memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000002780)) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000140)=0x100000008001) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000500)=""/188, 0xbc}], 0x1) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc1105517, &(0x7f0000001000)) 05:51:09 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440)={[{@sunit={'sunit', 0x3d, 0xfffffffffffffffa}}, {@swidth={'swidth', 0x3d, 0x4002}}]}) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") 05:51:10 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966aab4d9783f1ba36e852559977fdff81769f02b0d480541b2a9ac71841de8ad68c806b99761103a5ea7d63a4efd71593151b2e0dfdd2ec53091844510b7c913a72835b237d19d201654f1a8cab1a8ac2e2e37aac7fa7c10377f90200bc04487aedc86a0c75b2b5263f7b7df57de10ff2a988aade0eb99c44750757131f7d3b1ecded4cbe9ebe6d2a6b4e045f4190b4c8cd7105a524e29ecc08088dbb0017087125a0240a024cc46fccaab8ecaa7fd7273ee7e8e5692756832eed581d8e1d0ef425f83f9d449513f47b7bc9f1ea52441599a49686bda6524284c5a7cac38359658b713fd4cf81322ad880745be35ed66340691fc41422e523a30f77c6ae0a15bc4d0a2034cf87ca261700dbc5da76448c5c7fed5e3dc21e53187b025a89f1f6ff96920a684adf7266319cabe73561897cbbf3dd0c9b11837ab44a08d143fa2506d2383df4586573e77829062046f04261d9c481c2411d8053b16edaad812bce6bfb57e05c14b580f78b9977b110e7b0a6a5199899bb530796dc89778ebafa40ceb55c8d0ac5b6a0b7b16cda39c553d4eb99d75605c3a4ec27640c1208bed39caafe977ee8977e0569352e64c7b7aae67b564081072dae7c9dd377e4b634696bc108c3e27ca6e23ddd2d95fc"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2, 0x0, 0x1}) [ 244.923106] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1, syncid = 4, id = 0 [ 244.999933] XFS (loop1): Invalid superblock magic number 05:51:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 05:51:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000000)=0x72, 0x4) accept4$unix(r2, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 05:51:10 executing program 5: syz_read_part_table(0x4000000005245, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200eeffffff01000000ff07480000000000fffffff5", 0x16, 0x1c0}]) 05:51:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x101000, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) sched_setscheduler(r5, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r6 = creat(&(0x7f0000000380)='./file0/file0\x00', 0x100) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) keyctl$update(0x2, 0x0, &(0x7f0000000680)="74d1f36114c27a1ed31754f01c8d673f680ff5934c080a050000000000000039e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bd", 0x6e) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x0, 0x1000, 0x101}) ioctl$VT_RELDISP(r0, 0x5605) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r9 = dup2(r7, 0xffffffffffffffff) ioctl$TIOCCONS(r9, 0x541d) fdatasync(r8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000005500)=[{{&(0x7f0000001800)=@ipx, 0x80, &(0x7f0000000480)=[{&(0x7f0000001880)=""/73, 0x49}], 0x1, &(0x7f0000001900)=""/4096, 0x1000, 0x1000}, 0x8}, {{&(0x7f0000002900)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/106, 0x6a}, {&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000002a00)=""/137, 0x89}, {&(0x7f0000002ac0)=""/55, 0x37}], 0x4, &(0x7f0000002b40)=""/88, 0x58, 0xff}}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000004d40)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/82, 0x52}, {&(0x7f0000003cc0)=""/83, 0x53}, {&(0x7f0000003d40)=""/4096, 0x1000}], 0x4, &(0x7f0000004d80)=""/76, 0x4c, 0x7fff}, 0x1000}, {{&(0x7f0000004e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e80)=""/33, 0x21}, {&(0x7f0000004ec0)=""/154, 0x9a}], 0x2, &(0x7f0000004fc0)=""/98, 0x62, 0x7}, 0x100000001}, {{&(0x7f0000005040)=@pppol2tpv3in6, 0x80, &(0x7f0000005440)=[{&(0x7f00000050c0)=""/115, 0x73}, {&(0x7f0000005140)=""/253, 0xfd}, {&(0x7f0000005240)=""/252, 0xfc}, {&(0x7f0000005340)=""/124, 0x7c}, {&(0x7f00000053c0)=""/112, 0x70}], 0x5, &(0x7f00000054c0)=""/60, 0x3c}, 0x40}], 0x5, 0x10140, &(0x7f0000005640)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005780)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000057c0)={{{@in6, @in=@multicast1, 0x4e24, 0x80000000, 0x4e20, 0x40, 0xa, 0xa0, 0x20, 0x2c, r10, r11}, {0x1f, 0x5, 0xf994, 0x4, 0x3e, 0x7, 0x1004000000, 0x4}, {0xfff, 0x5, 0x1000, 0x3}, 0xb6, 0x6e6bbd, 0x0, 0x0, 0x3, 0x2}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x8, 0x1ff, 0x80, 0x1}}, 0xe8) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x200000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x8000000000000a00, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x5, 0x0, 0x7}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r12, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 05:51:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x8000000000000000) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xffffffffffffff6d) getegid() fcntl$getownex(r0, 0x10, &(0x7f0000000340)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f00000002c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r5, 0x7003, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x100000000000000) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966aab4d9783f1ba36e852559977fdff81769f02b0d480541b2a9ac71841de8ad68c806b99761103a5ea7d63a4efd71593151b2e0dfdd2ec53091844510b7c913a72835b237d19d201654f1a8cab1a8ac2e2e37aac7fa7c10377f90200bc04487aedc86a0c75b2b5263f7b7df57de10ff2a988aade0eb99c44750757131f7d3b1ecded4cbe9ebe6d2a6b4e045f4190b4c8cd7105a524e29ecc08088dbb0017087125a0240a024cc46fccaab8ecaa7fd7273ee7e8e5692756832eed581d8e1d0ef425f83f9d449513f47b7bc9f1ea52441599a49686bda6524284c5a7cac38359658b713fd4cf81322ad880745be35ed66340691fc41422e523a30f77c6ae0a15bc4d0a2034cf87ca261700dbc5da76448c5c7fed5e3dc21e53187b025a89f1f6ff96920a684adf7266319cabe73561897cbbf3dd0c9b11837ab44a08d143fa2506d2383df4586573e77829062046f04261d9c481c2411d8053b16edaad812bce6bfb57e05c14b580f78b9977b110e7b0a6a5199899bb530796dc89778ebafa40ceb55c8d0ac5b6a0b7b16cda39c553d4eb99d75605c3a4ec27640c1208bed39caafe977ee8977e0569352e64c7b7aae67b564081072dae7c9dd377e4b634696bc108c3e27ca6e23ddd2d95fc"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) [ 245.255108] loop5: AHDI p1 p2 05:51:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'sit0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) dup2(0xffffffffffffffff, r0) [ 245.311370] FAT-fs (loop1): bogus number of reserved sectors [ 245.317736] FAT-fs (loop1): Can't find a valid FAT filesystem 05:51:10 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x4) sendto$inet6(r1, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}, 0xd2e7}, 0x1c) 05:51:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x0, @loopback}], 0x10) connect$inet(r0, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x4) r1 = accept(r0, &(0x7f0000000100)=ANY=[], &(0x7f0000000000)) listen(r0, 0x0) sendto$inet(r0, &(0x7f0000000200)="cf", 0x1, 0x0, &(0x7f0000a04000)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) close(r1) 05:51:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r1, 0x40085511, 0x70f000) 05:51:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x101000, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) sched_setscheduler(r5, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r6 = creat(&(0x7f0000000380)='./file0/file0\x00', 0x100) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) keyctl$update(0x2, 0x0, &(0x7f0000000680)="74d1f36114c27a1ed31754f01c8d673f680ff5934c080a050000000000000039e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bd", 0x6e) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x0, 0x1000, 0x101}) ioctl$VT_RELDISP(r0, 0x5605) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r9 = dup2(r7, 0xffffffffffffffff) ioctl$TIOCCONS(r9, 0x541d) fdatasync(r8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000005500)=[{{&(0x7f0000001800)=@ipx, 0x80, &(0x7f0000000480)=[{&(0x7f0000001880)=""/73, 0x49}], 0x1, &(0x7f0000001900)=""/4096, 0x1000, 0x1000}, 0x8}, {{&(0x7f0000002900)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/106, 0x6a}, {&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000002a00)=""/137, 0x89}, {&(0x7f0000002ac0)=""/55, 0x37}], 0x4, &(0x7f0000002b40)=""/88, 0x58, 0xff}}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000004d40)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/82, 0x52}, {&(0x7f0000003cc0)=""/83, 0x53}, {&(0x7f0000003d40)=""/4096, 0x1000}], 0x4, &(0x7f0000004d80)=""/76, 0x4c, 0x7fff}, 0x1000}, {{&(0x7f0000004e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e80)=""/33, 0x21}, {&(0x7f0000004ec0)=""/154, 0x9a}], 0x2, &(0x7f0000004fc0)=""/98, 0x62, 0x7}, 0x100000001}, {{&(0x7f0000005040)=@pppol2tpv3in6, 0x80, &(0x7f0000005440)=[{&(0x7f00000050c0)=""/115, 0x73}, {&(0x7f0000005140)=""/253, 0xfd}, {&(0x7f0000005240)=""/252, 0xfc}, {&(0x7f0000005340)=""/124, 0x7c}, {&(0x7f00000053c0)=""/112, 0x70}], 0x5, &(0x7f00000054c0)=""/60, 0x3c}, 0x40}], 0x5, 0x10140, &(0x7f0000005640)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005780)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000057c0)={{{@in6, @in=@multicast1, 0x4e24, 0x80000000, 0x4e20, 0x40, 0xa, 0xa0, 0x20, 0x2c, r10, r11}, {0x1f, 0x5, 0xf994, 0x4, 0x3e, 0x7, 0x1004000000, 0x4}, {0xfff, 0x5, 0x1000, 0x3}, 0xb6, 0x6e6bbd, 0x0, 0x0, 0x3, 0x2}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x8, 0x1ff, 0x80, 0x1}}, 0xe8) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x200000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x8000000000000a00, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x5, 0x0, 0x7}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r12, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 05:51:10 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000740)=""/4096, 0x2005}], 0x1) 05:51:10 executing program 3: socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000007780)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000006cc0)=@nfc={0x1e}, 0x80, &(0x7f0000007080), 0x0, &(0x7f0000009d00)}}], 0x2, 0x0) 05:51:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r1, 0x40085511, 0x70f000) [ 245.801426] FAT-fs (loop1): bogus number of reserved sectors [ 245.808547] FAT-fs (loop1): Can't find a valid FAT filesystem 05:51:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x101000, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) sched_setscheduler(r5, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r6 = creat(&(0x7f0000000380)='./file0/file0\x00', 0x100) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) keyctl$update(0x2, 0x0, &(0x7f0000000680)="74d1f36114c27a1ed31754f01c8d673f680ff5934c080a050000000000000039e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bd", 0x6e) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x0, 0x1000, 0x101}) ioctl$VT_RELDISP(r0, 0x5605) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r9 = dup2(r7, 0xffffffffffffffff) ioctl$TIOCCONS(r9, 0x541d) fdatasync(r8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000005500)=[{{&(0x7f0000001800)=@ipx, 0x80, &(0x7f0000000480)=[{&(0x7f0000001880)=""/73, 0x49}], 0x1, &(0x7f0000001900)=""/4096, 0x1000, 0x1000}, 0x8}, {{&(0x7f0000002900)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/106, 0x6a}, {&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000002a00)=""/137, 0x89}, {&(0x7f0000002ac0)=""/55, 0x37}], 0x4, &(0x7f0000002b40)=""/88, 0x58, 0xff}}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000004d40)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/82, 0x52}, {&(0x7f0000003cc0)=""/83, 0x53}, {&(0x7f0000003d40)=""/4096, 0x1000}], 0x4, &(0x7f0000004d80)=""/76, 0x4c, 0x7fff}, 0x1000}, {{&(0x7f0000004e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e80)=""/33, 0x21}, {&(0x7f0000004ec0)=""/154, 0x9a}], 0x2, &(0x7f0000004fc0)=""/98, 0x62, 0x7}, 0x100000001}, {{&(0x7f0000005040)=@pppol2tpv3in6, 0x80, &(0x7f0000005440)=[{&(0x7f00000050c0)=""/115, 0x73}, {&(0x7f0000005140)=""/253, 0xfd}, {&(0x7f0000005240)=""/252, 0xfc}, {&(0x7f0000005340)=""/124, 0x7c}, {&(0x7f00000053c0)=""/112, 0x70}], 0x5, &(0x7f00000054c0)=""/60, 0x3c}, 0x40}], 0x5, 0x10140, &(0x7f0000005640)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005780)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000057c0)={{{@in6, @in=@multicast1, 0x4e24, 0x80000000, 0x4e20, 0x40, 0xa, 0xa0, 0x20, 0x2c, r10, r11}, {0x1f, 0x5, 0xf994, 0x4, 0x3e, 0x7, 0x1004000000, 0x4}, {0xfff, 0x5, 0x1000, 0x3}, 0xb6, 0x6e6bbd, 0x0, 0x0, 0x3, 0x2}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x8, 0x1ff, 0x80, 0x1}}, 0xe8) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x200000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x8000000000000a00, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x5, 0x0, 0x7}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r12, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 05:51:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'sit0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) dup2(0xffffffffffffffff, r0) 05:51:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r1, 0x40085511, 0x70f000) 05:51:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f00000031c0)}], 0x1, &(0x7f0000003300), 0x0, 0x80}}], 0x1, 0x0) setpgid(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @ipv4, 0x1ff}], 0xffffffffffffff1c) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0xc17, 0x4) 05:51:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$KVM_SET_TSC_KHZ(r1, 0x40085511, 0x70f000) [ 246.054170] FAT-fs (loop1): bogus number of reserved sectors [ 246.060266] FAT-fs (loop1): Can't find a valid FAT filesystem 05:51:11 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8001) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000540)=0x5) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet6(0xa, 0x3, 0x1ea1) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)=@known='trusted.syz\x00', &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x15, 0x2) [ 246.352806] sysfs: Unknown parameter ' ' 05:51:11 executing program 5: mincore(&(0x7f0000ffc000/0x2000)=nil, 0x20ffe000, &(0x7f0000000000)=""/136) 05:51:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x101000, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f00000002c0)=0xc) sched_setscheduler(r5, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r6 = creat(&(0x7f0000000380)='./file0/file0\x00', 0x100) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x1) keyctl$update(0x2, 0x0, &(0x7f0000000680)="74d1f36114c27a1ed31754f01c8d673f680ff5934c080a050000000000000039e11f4e3205bba780dd8600344a95dc7cbd8b1e47f5186867228aef82ae32e18492f6d14d8bae2b741f423f4b24ca0f3255a01f5ea1306d0dcc61dbf4e680787d6ab9bf1cfdbb592ded2ccd7fa3bd", 0x6e) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r6, 0x5456, &(0x7f0000000140)={0x2, 0x6, 0x4, 0x7, 0xadb, 0x0, 0x7, 0xfff, 0x3, 0x0, 0x1000, 0x101}) ioctl$VT_RELDISP(r0, 0x5605) r7 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r9 = dup2(r7, 0xffffffffffffffff) ioctl$TIOCCONS(r9, 0x541d) fdatasync(r8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c832, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000005500)=[{{&(0x7f0000001800)=@ipx, 0x80, &(0x7f0000000480)=[{&(0x7f0000001880)=""/73, 0x49}], 0x1, &(0x7f0000001900)=""/4096, 0x1000, 0x1000}, 0x8}, {{&(0x7f0000002900)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/106, 0x6a}, {&(0x7f0000000640)=""/18, 0x12}, {&(0x7f0000002a00)=""/137, 0x89}, {&(0x7f0000002ac0)=""/55, 0x37}], 0x4, &(0x7f0000002b40)=""/88, 0x58, 0xff}}, {{&(0x7f0000002bc0)=@ax25, 0x80, &(0x7f0000004d40)=[{&(0x7f0000002c40)=""/4096, 0x1000}, {&(0x7f0000003c40)=""/82, 0x52}, {&(0x7f0000003cc0)=""/83, 0x53}, {&(0x7f0000003d40)=""/4096, 0x1000}], 0x4, &(0x7f0000004d80)=""/76, 0x4c, 0x7fff}, 0x1000}, {{&(0x7f0000004e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004f80)=[{&(0x7f0000004e80)=""/33, 0x21}, {&(0x7f0000004ec0)=""/154, 0x9a}], 0x2, &(0x7f0000004fc0)=""/98, 0x62, 0x7}, 0x100000001}, {{&(0x7f0000005040)=@pppol2tpv3in6, 0x80, &(0x7f0000005440)=[{&(0x7f00000050c0)=""/115, 0x73}, {&(0x7f0000005140)=""/253, 0xfd}, {&(0x7f0000005240)=""/252, 0xfc}, {&(0x7f0000005340)=""/124, 0x7c}, {&(0x7f00000053c0)=""/112, 0x70}], 0x5, &(0x7f00000054c0)=""/60, 0x3c}, 0x40}], 0x5, 0x10140, &(0x7f0000005640)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000005780)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f00000057c0)={{{@in6, @in=@multicast1, 0x4e24, 0x80000000, 0x4e20, 0x40, 0xa, 0xa0, 0x20, 0x2c, r10, r11}, {0x1f, 0x5, 0xf994, 0x4, 0x3e, 0x7, 0x1004000000, 0x4}, {0xfff, 0x5, 0x1000, 0x3}, 0xb6, 0x6e6bbd, 0x0, 0x0, 0x3, 0x2}, {{@in=@multicast1, 0x4d6, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x8, 0x1ff, 0x80, 0x1}}, 0xe8) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r12 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x200000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x8000000000000a00, 0x0) syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x100000001, 0x80) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x7fffffff, 0x5, 0x0, 0x7}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r12, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text16={0x10, &(0x7f0000000140)="360f303e0f01df6766c74424000900000d6766c7442402020000006766c744240600000000670f011c240f20c06635200000000f22c0263356470f0764f30f2a342e260f0f970a008e0f08660f5808", 0x4f}], 0x1, 0x0, &(0x7f0000000200), 0x0) 05:51:11 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'sit0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) dup2(0xffffffffffffffff, r0) 05:51:11 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8001) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000540)=0x5) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet6(0xa, 0x3, 0x1ea1) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)=@known='trusted.syz\x00', &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x15, 0x2) 05:51:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f00000031c0)}], 0x1, &(0x7f0000003300), 0x0, 0x80}}], 0x1, 0x0) setpgid(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @ipv4, 0x1ff}], 0xffffffffffffff1c) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0xc17, 0x4) 05:51:11 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8001) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000540)=0x5) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet6(0xa, 0x3, 0x1ea1) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)=@known='trusted.syz\x00', &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x15, 0x2) [ 246.705686] FAT-fs (loop1): bogus number of reserved sectors [ 246.711840] FAT-fs (loop1): Can't find a valid FAT filesystem 05:51:11 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) read(r0, &(0x7f0000000200)=""/28, 0x3fc) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000180)) tkill(r1, 0x1000000000013) 05:51:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f00000031c0)}], 0x1, &(0x7f0000003300), 0x0, 0x80}}], 0x1, 0x0) setpgid(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @ipv4, 0x1ff}], 0xffffffffffffff1c) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0xc17, 0x4) 05:51:12 executing program 0: socket$inet6(0xa, 0x1000000000002, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8001) setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000540)=0x5) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$inet6(0xa, 0x3, 0x1ea1) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000000580)=0xc) umount2(&(0x7f0000000000)='./file0\x00', 0x0) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)=@known='trusted.syz\x00', &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x15, 0x2) 05:51:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x3, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 05:51:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'sit0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x69, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) dup2(0xffffffffffffffff, r0) 05:51:12 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0xc10, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x44050) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, &(0x7f00005d8000/0x4000)=nil, 0x707}) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @broadcast}, 0x4}}, 0x2e) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) setsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x8, &(0x7f0000000340)=0x105, 0x4) write$binfmt_misc(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x166) fsetxattr(r4, &(0x7f0000000440)=@random={'btrfs.', ')\x00'}, &(0x7f0000000580)='/dev/ashmem\x00', 0xc, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x2, 0x9, 0x200, 0x9, 0x7f, 0x80000001, 0xfffffffffffffff8, 0x0, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000280)={r6, 0x81, 0x7fffffff}, &(0x7f00000002c0)=0x10) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) modify_ldt$read(0x0, &(0x7f0000000380)=""/190, 0xbe) 05:51:12 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 05:51:12 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) umount2(&(0x7f0000000040)='./file0\x00', 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000047c0)=[{{0x0, 0x0, &(0x7f00000032c0)=[{&(0x7f00000031c0)}], 0x1, &(0x7f0000003300), 0x0, 0x80}}], 0x1, 0x0) setpgid(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @ipv4, 0x1ff}], 0xffffffffffffff1c) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000080)=0xc17, 0x4) 05:51:12 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:12 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:12 executing program 2: setrlimit(0x8, &(0x7f0000000140)={0x100000000, 0xfffffffffffffffc}) mlockall(0x8000000001) 05:51:12 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@profile={'permprofile ', ':"//em0ppp1vboxnet0-user\x00'}, 0x25) 05:51:12 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) [ 247.932043] audit: type=1400 audit(1540965073.059:31): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=8097 comm="syz-executor5" 05:51:13 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@profile={'permprofile ', ':"//em0ppp1vboxnet0-user\x00'}, 0x25) [ 248.133435] audit: type=1400 audit(1540965073.269:32): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=8104 comm="syz-executor5" 05:51:13 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@profile={'permprofile ', ':"//em0ppp1vboxnet0-user\x00'}, 0x25) 05:51:13 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) [ 248.303413] audit: type=1400 audit(1540965073.439:33): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=8112 comm="syz-executor5" 05:51:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/8, &(0x7f0000000240)=0x8) 05:51:13 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@profile={'permprofile ', ':"//em0ppp1vboxnet0-user\x00'}, 0x25) 05:51:13 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) [ 248.486089] audit: type=1400 audit(1540965073.609:34): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name=3A222F2F656D307070703176626F786E6574302D75736572 pid=8121 comm="syz-executor5" 05:51:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=@delqdisc={0x34, 0x25, 0x3, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xc, 0x1, 'codel\x00'}, {0x4}}]}, 0x34}}, 0x0) 05:51:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/8, &(0x7f0000000240)=0x8) 05:51:13 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:13 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x6c}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x4ae, &(0x7f0000000340)=""/207}, 0x48) 05:51:13 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/8, &(0x7f0000000240)=0x8) 05:51:14 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:14 executing program 0: r0 = socket$kcm(0x2, 0x3, 0x84) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/8, &(0x7f0000000240)=0x8) 05:51:14 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000e40)='/dev/sg#\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 05:51:14 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000e40)='/dev/sg#\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 05:51:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={"7465616d300000163694d900", 0x0}) sendmsg$nl_route(r0, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x30, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_XDP={0x4, 0x2b, [@nested={0xc, 0x1, [@typed={0x63, 0x0, @fd}]}]}]}, 0x30}}, 0x0) 05:51:14 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/dev/hwrng\x00', 0x800, 0x0) sendmsg$alg(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c80)="2613eb629d4cf40fc7eac908bc8daba7d0859ce6b6410ae636333fab6da4d17c92ddd0161fb3993e2856846397", 0x2d}], 0x1, 0x0, 0x0, 0x4008000}, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0xffffffffffffffca}, 0x7) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x0, 0x0) sendmsg$key(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000680)=ANY=[@ANYBLOB="020694090d000070f50029bd7000fedbdf250b00180006004c00124889673ca8209fad9445476f6619115aea9bd95ad33ca9588c0401358b76d9f85318526e32486cfdb343bac9c6126d749de25438bfb1e03fabcd8c83ab279bcf5b10d7d2949fc48c39e98a0000"], 0x68}}, 0x50) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RREADDIR(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="2a000000290100000000000000000000000000000000000000000000000000000007002e36666d6c6530"], 0x2a) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vga_arbiter\x00', 0x3fffffff, 0x0) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) splice(r1, &(0x7f00000008c0), r3, &(0x7f0000000940)=0x52, 0xffff, 0x0) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7, 0x4d, 0x1}, 0x7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000001200)={0x0, 0x91, "4407ef6ab0ec751a2f6b0ed54b3caad7c779b3fe31fe58539bfb22f11307d53c20bb14bc578620144ad028070c475ef287f4fbc175e44355d20e7c356e0cd3a41978c9559b708b04ab7d7c165e8d0a5358c6d599f837fb7424ed556b8b9c80bf92b97c67a6ec94ea4542d6cacabac82d7d752ebeea40d587da723223c8d94f2a81d21119a5443841c7a8a85140892695c0"}, &(0x7f00000012c0)=0x99) umount2(&(0x7f0000000500)='./file0\x00', 0x0) getrusage(0x0, &(0x7f0000000580)) fallocate(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x20) syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="aaaaaaaaaa00aaaaaaaaaabb0800451f00be0067000908ff9078ffffffffe000000136009078ac14141569491495f2b6037519fa0c43c090eccbf08e3fbe0f1666c1e2829e62b5b2e2f110bcb4cc0d162b896d9911560ee6c4110f407b974ea1e81ca168e8ec26f1d17483f9e631e0f30a131a6d7a8cf6edd2d08b64d685a6111d1df2b9eeddf7b4a421149607de924168a9b00569b6e9bfc9bcff135b74d8b7587c44e8cfc6e684ea26002030f815bfd1bf5c44a4bd6fdcef3b6dfcd337612ea5"], &(0x7f0000000640)={0x1, 0x2, [0xd9b, 0x6f7, 0x10b, 0x685]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000080)={0x7, 0x21, 0x2}, 0x7) r5 = socket$inet(0x2, 0x2, 0x3) bind$inet(r5, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000001380)=ANY=[], 0x0) setsockopt$inet_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000800), 0x4) ioctl$UFFDIO_COPY(r4, 0xc028aa03, &(0x7f0000000540)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1}) 05:51:14 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0xfdfdffff, 0x1, 0x1}) 05:51:14 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000e40)='/dev/sg#\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 05:51:14 executing program 5: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c00)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000e40)='/dev/sg#\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) 05:51:14 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:14 executing program 4: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000003000500000000000000000000000000000000000000000000000000040000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{0x400000000000000}]}, 0x10) 05:51:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000110, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080), &(0x7f00000000c0)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000140)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 05:51:14 executing program 3: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:15 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000110, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080), &(0x7f00000000c0)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000140)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 05:51:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0xfdfdffff, 0x1, 0x1}) 05:51:15 executing program 3: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000110, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080), &(0x7f00000000c0)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000140)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 05:51:16 executing program 4: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000003000500000000000000000000000000000000000000000000000000040000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{0x400000000000000}]}, 0x10) 05:51:16 executing program 3: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:16 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:16 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000200), 0x4) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000110, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) capset(&(0x7f0000000080), &(0x7f00000000c0)) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000140)=0x4) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000280)={'NETMAP\x00'}, &(0x7f00000002c0)=0x1e) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) 05:51:16 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0xfdfdffff, 0x1, 0x1}) 05:51:16 executing program 3: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:16 executing program 4: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000003000500000000000000000000000000000000000000000000000000040000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{0x400000000000000}]}, 0x10) 05:51:16 executing program 5: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) 05:51:17 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:17 executing program 5: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:17 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 05:51:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"6c6f00fffffff500"}) [ 252.516713] device lo entered promiscuous mode 05:51:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f00004d4000)=@nl=@proc, &(0x7f0000047ffc)=0xc, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000080)={0xfdfdffff, 0x1, 0x1}) [ 252.547927] device lo left promiscuous mode 05:51:17 executing program 4: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c00000003000500000000000000000000000000000000000000000000000000040000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x85c, &(0x7f0000000000)=[{0x400000000000000}]}, 0x10) 05:51:17 executing program 5: socket$inet6(0xa, 0x80803, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sched_rr_get_interval(0x0, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000003c0)={0x0, 0x3, 0x7, 0x2bc5}, &(0x7f0000000400)=0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000000c0)="809934b108832415243f49a936f7a035e017a99a25d8f2cb497555dba9ed810ec1e3ee92fff7668b45d3c85b9bf759b17318f5a9ba8c125ea8c425abc9a15a3282b5ff86f79aec93bf7c6574a25ff10397c644a05be53371e10c99a1e391", 0x5e) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr, 0x4d4, 0x2b}, 0x0, @in6=@mcast2}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 05:51:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000000)={0xb}, 0xb) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000003ff8)=0x80) 05:51:18 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r2, 0x0) setresuid(0x0, r1, 0x0) setresgid(0x0, 0x0, r2) 05:51:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000080)=[{r0}], 0x1, 0xb7) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000100), 0x7a2a, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f00000004c0)=@setlink={0x20}, 0x20}}, 0x0) sendto$inet6(r1, &(0x7f0000000200)='A', 0x1, 0xfffffffffffffffd, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) 05:51:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:18 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000000)={{0x7fffffff, 0x8009}}) [ 253.358190] device lo entered promiscuous mode 05:51:18 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000ea5000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) [ 253.416220] device lo left promiscuous mode 05:51:18 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x42021) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$sndseq(r0, &(0x7f0000000e50), 0xfffffe41) 05:51:18 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0x4, 0x60cd, 0x7, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioprio_get$uid(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r0, 0x20e, &(0x7f0000000180)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r2, 0x0, 0x10}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r3, &(0x7f0000000240), &(0x7f0000001340)=""/4096}, 0x18) 05:51:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"6c6f00fffffff500"}) 05:51:19 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x0) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000200)=""/117, &(0x7f00000000c0)=0x75) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) socket$nl_route(0x10, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) clone(0x0, &(0x7f00000006c0), &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 05:51:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:19 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x42021) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$sndseq(r0, &(0x7f0000000e50), 0xfffffe41) 05:51:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) [ 253.958204] device lo entered promiscuous mode [ 253.987454] device lo left promiscuous mode 05:51:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:19 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) 05:51:22 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x0) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000200)=""/117, &(0x7f00000000c0)=0x75) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) socket$nl_route(0x10, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) clone(0x0, &(0x7f00000006c0), &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) [ 257.149848] attempt to access beyond end of device [ 257.168865] loop2: rw=1, want=36257, limit=112 05:51:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"6c6f00fffffff500"}) 05:51:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="2000000000020300ffff00000000000000000000040002000800030025000000"], 0x20}}, 0x0) 05:51:22 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x42021) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$sndseq(r0, &(0x7f0000000e50), 0xfffffe41) 05:51:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x3, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) close(r0) [ 257.425616] device lo entered promiscuous mode 05:51:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) [ 257.516309] device lo left promiscuous mode 05:51:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003440)={&(0x7f0000000080), 0xc, &(0x7f0000003400)={&(0x7f0000003000)={0x14, r1, 0x11}, 0x14}}, 0x0) 05:51:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000007c0)=@nat={'nat\x00', 0x19, 0x4, 0x588, [0x20000200, 0x0, 0x0, 0x20000230, 0x200003b0], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x86dd, 'team_slave_1\x00', 'bond_slave_1\x00', 'bond_slave_0\x00', 'bond_slave_0\x00', @broadcast, [], @empty, [], 0xe8, 0x118, 0x150, [@ip6={'ip6\x00', 0x50, {{@loopback, @mcast1, [], [], 0x0, 0x0, 0x18, 0x8}}}]}, [@common=@STANDARD={'\x00', 0x8}]}, @arpreply={'arpreply\x00', 0x10, {{@dev}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x9, 0x0, 0x0, 'nr0\x00', '\x00', 'veth0_to_bond\x00', 'vlan0\x00', @empty, [], @link_local, [], 0x100, 0x138, 0x168, [@devgroup={'devgroup\x00', 0x18}, @helper={'helper\x00', 0x28, {{0x0, 'H.245\x00'}}}]}, [@snat={'snat\x00', 0x10, {{@broadcast}}}]}, @common=@STANDARD={'\x00', 0x8}}, {{{0x9, 0x0, 0x0, 'gretap0\x00', 'vlan0\x00', 'bond_slave_1\x00', 'ip6_vti0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe8, [@time={'time\x00', 0x18}]}}, @snat={'snat\x00', 0x10, {{@remote}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, '\x00', 'ip6tnl0\x00', 'ip6tnl0\x00', 'gre0\x00', @link_local, [], @random="015948c39ee6", [], 0x70, 0xf0, 0x128}, [@snat={'snat\x00', 0x10}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x600) 05:51:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x338f, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r1, &(0x7f0000000200), &(0x7f000089b000)}, 0x18) 05:51:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)=""/250, 0xfa}], 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 05:51:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:23 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x0) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000200)=""/117, &(0x7f00000000c0)=0x75) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) socket$nl_route(0x10, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) clone(0x0, &(0x7f00000006c0), &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 05:51:23 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000042000)='/dev/snd/seq\x00', 0x0, 0x42021) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000030fb4)={0x0, 0x0, 0x207}) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write$sndseq(r0, &(0x7f0000000e50), 0xfffffe41) 05:51:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb6000)="1f00000002031900000007000000e3800802bb0509000100010100493ffe58", 0x1f}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000180)={"6c6f00fffffff500"}) 05:51:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') bind$alg(r0, &(0x7f0000466000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd160\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000a2effc), 0x3fc) [ 258.514357] attempt to access beyond end of device [ 258.519533] loop2: rw=1, want=130, limit=112 [ 258.561410] Buffer I/O error on dev loop2, logical block 129, lost async page write [ 258.572026] device lo entered promiscuous mode [ 258.605756] attempt to access beyond end of device [ 258.622777] device lo left promiscuous mode [ 258.632011] loop2: rw=1, want=131, limit=112 [ 258.651686] Buffer I/O error on dev loop2, logical block 130, lost async page write [ 258.686962] attempt to access beyond end of device 05:51:23 executing program 5: r0 = gettid() rt_sigqueueinfo(r0, 0xfffffff9, &(0x7f0000000080)) [ 258.709688] loop2: rw=1, want=132, limit=112 [ 258.735341] Buffer I/O error on dev loop2, logical block 131, lost async page write [ 258.776554] attempt to access beyond end of device [ 258.801447] loop2: rw=1, want=133, limit=112 [ 258.824965] Buffer I/O error on dev loop2, logical block 132, lost async page write [ 258.870316] attempt to access beyond end of device 05:51:24 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000180)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x0, 0x8, @fr_pvc=&(0x7f0000000040)}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)) r2 = memfd_create(&(0x7f0000000040)="000000008c00", 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/68, 0x44}], 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, &(0x7f00000ddff8), 0x1020026fd) [ 258.898381] loop2: rw=1, want=142, limit=112 [ 258.927711] Buffer I/O error on dev loop2, logical block 141, lost async page write [ 258.989761] attempt to access beyond end of device [ 259.011680] loop2: rw=1, want=143, limit=112 [ 259.036017] Buffer I/O error on dev loop2, logical block 142, lost async page write [ 259.066023] attempt to access beyond end of device [ 259.085330] loop2: rw=1, want=144, limit=112 [ 259.102913] Buffer I/O error on dev loop2, logical block 143, lost async page write [ 259.132962] attempt to access beyond end of device [ 259.152965] loop2: rw=1, want=145, limit=112 [ 259.173386] Buffer I/O error on dev loop2, logical block 144, lost async page write [ 259.218182] attempt to access beyond end of device [ 259.248237] loop2: rw=1, want=4241, limit=112 05:51:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) [ 259.277049] attempt to access beyond end of device [ 259.293415] loop2: rw=1, want=5209, limit=112 05:51:24 executing program 1: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x80) 05:51:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) [ 259.345713] attempt to access beyond end of device [ 259.350696] loop2: rw=1, want=5238, limit=112 [ 259.401895] Buffer I/O error on dev loop2, logical block 5237, lost async page write [ 259.417860] attempt to access beyond end of device [ 259.435796] loop2: rw=1, want=5239, limit=112 05:51:24 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000580)=0x8) fdatasync(0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000040)=[{}, {0x6, 0x400, 0x1000}, {0x1, 0x0, 0x800}, {0x1, 0x4, 0x1000}, {0x2, 0x7f, 0x800}, {0x3, 0x4, 0x1000}], 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448c9, &(0x7f0000000000)={0x0, &(0x7f0000000480)}) [ 259.448006] Buffer I/O error on dev loop2, logical block 5238, lost async page write [ 259.489948] attempt to access beyond end of device [ 259.536159] loop2: rw=1, want=5240, limit=112 [ 259.577336] NFS: bad mount option value specified: vmnet0wlan1 [ 259.610228] attempt to access beyond end of device [ 259.639104] loop2: rw=1, want=5241, limit=112 [ 259.661375] attempt to access beyond end of device [ 259.679690] loop2: rw=1, want=5262, limit=112 [ 259.696428] attempt to access beyond end of device [ 259.715678] loop2: rw=1, want=5263, limit=112 [ 259.730756] attempt to access beyond end of device [ 259.765279] loop2: rw=1, want=5264, limit=112 [ 259.773766] NFS: bad mount option value specified: vmnet0wlan1 [ 259.791521] attempt to access beyond end of device [ 259.823717] loop2: rw=1, want=5265, limit=112 [ 259.857894] attempt to access beyond end of device [ 259.891813] loop2: rw=1, want=5314, limit=112 [ 259.924648] attempt to access beyond end of device [ 259.957122] loop2: rw=1, want=5315, limit=112 [ 259.997961] attempt to access beyond end of device [ 260.035358] loop2: rw=1, want=5316, limit=112 [ 260.069536] attempt to access beyond end of device [ 260.107101] loop2: rw=1, want=5317, limit=112 [ 260.142354] attempt to access beyond end of device [ 260.157709] loop2: rw=1, want=5326, limit=112 [ 260.167613] attempt to access beyond end of device [ 260.177147] loop2: rw=1, want=5327, limit=112 [ 260.181987] attempt to access beyond end of device [ 260.187053] loop2: rw=1, want=5328, limit=112 [ 260.191921] attempt to access beyond end of device [ 260.196972] loop2: rw=1, want=5329, limit=112 [ 260.209019] attempt to access beyond end of device [ 260.214305] loop2: rw=1, want=9425, limit=112 [ 260.240353] attempt to access beyond end of device [ 260.245443] loop2: rw=1, want=13521, limit=112 [ 260.257790] attempt to access beyond end of device [ 260.262771] loop2: rw=1, want=17617, limit=112 [ 260.272235] attempt to access beyond end of device [ 260.277177] loop2: rw=1, want=21137, limit=112 05:51:26 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r1 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x0) futex(&(0x7f0000000280), 0x6, 0x2, &(0x7f0000000300), &(0x7f0000000380), 0x1) getsockopt$inet6_tcp_buf(r0, 0x6, 0x16, &(0x7f0000000200)=""/117, &(0x7f00000000c0)=0x75) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x0) socket$nl_route(0x10, 0x3, 0x0) shutdown(0xffffffffffffffff, 0x1) clone(0x0, &(0x7f00000006c0), &(0x7f0000000040), &(0x7f0000000140), &(0x7f0000000180)) 05:51:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x11, 0x0, 0x16b5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000180)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x0, 0x8, @fr_pvc=&(0x7f0000000040)}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)) r2 = memfd_create(&(0x7f0000000040)="000000008c00", 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/68, 0x44}], 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, &(0x7f00000ddff8), 0x1020026fd) 05:51:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100), 0x28) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) getpgid(r1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x1e, 0x4, 0x0) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'security.', '\x00'}) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000a40), 0x400000000000224, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000380)={0xffffffffffffffff, 0x0, 0x8, 0xcf, 0x8}) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001a010000010000007d0000000000000040f63309ca5a26bd538d3a3105fa8f8972bd60dd41b80638afabe90abbfa896120daaa624b245360d5122c6f5678fc519cc285023a533a007e14ebcdb56c7ef637e49df78076dc86b9cccb33d2c91ced9f2f81a0be3205482fc03dd9d1d04f"], 0x77}}], 0x1, 0x0) connect(r0, &(0x7f0000000540)=@in6={0xa, 0x0, 0x0, @dev, 0x3}, 0x80) 05:51:26 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000580)=0x8) fdatasync(0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000040)=[{}, {0x6, 0x400, 0x1000}, {0x1, 0x0, 0x800}, {0x1, 0x4, 0x1000}, {0x2, 0x7f, 0x800}, {0x3, 0x4, 0x1000}], 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448c9, &(0x7f0000000000)={0x0, &(0x7f0000000480)}) 05:51:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8dc, 0x20}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x6c}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) [ 261.144606] attempt to access beyond end of device [ 261.149607] loop2: rw=1, want=130, limit=112 [ 261.185632] attempt to access beyond end of device [ 261.190619] loop2: rw=1, want=131, limit=112 [ 261.238544] NFS: bad mount option value specified: vmnet0wlan1 [ 261.261764] attempt to access beyond end of device [ 261.282558] loop2: rw=1, want=132, limit=112 [ 261.300539] attempt to access beyond end of device [ 261.322213] loop2: rw=1, want=133, limit=112 [ 261.339245] attempt to access beyond end of device [ 261.372295] loop2: rw=1, want=142, limit=112 [ 261.376804] attempt to access beyond end of device 05:51:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 261.412674] loop2: rw=1, want=143, limit=112 [ 261.417187] attempt to access beyond end of device [ 261.417203] loop2: rw=1, want=144, limit=112 [ 261.458500] attempt to access beyond end of device [ 261.481254] loop2: rw=1, want=145, limit=112 05:51:26 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000180)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x0, 0x8, @fr_pvc=&(0x7f0000000040)}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)) r2 = memfd_create(&(0x7f0000000040)="000000008c00", 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/68, 0x44}], 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, &(0x7f00000ddff8), 0x1020026fd) [ 261.527725] attempt to access beyond end of device [ 261.539235] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 261.559080] loop2: rw=1, want=3609, limit=112 [ 261.594857] attempt to access beyond end of device [ 261.601315] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 261.629225] loop2: rw=1, want=3638, limit=112 [ 261.670162] attempt to access beyond end of device [ 261.710832] loop2: rw=1, want=3639, limit=112 [ 261.749457] attempt to access beyond end of device 05:51:26 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000580)=0x8) fdatasync(0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000040)=[{}, {0x6, 0x400, 0x1000}, {0x1, 0x0, 0x800}, {0x1, 0x4, 0x1000}, {0x2, 0x7f, 0x800}, {0x3, 0x4, 0x1000}], 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448c9, &(0x7f0000000000)={0x0, &(0x7f0000000480)}) 05:51:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 261.772533] loop2: rw=1, want=3640, limit=112 [ 261.792462] attempt to access beyond end of device [ 261.810128] loop2: rw=1, want=3641, limit=112 [ 261.827364] attempt to access beyond end of device [ 261.882449] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 261.902639] loop2: rw=1, want=3662, limit=112 05:51:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000000180)='/dev/ppp\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bond0\x00', @ifru_settings={0x0, 0x8, @fr_pvc=&(0x7f0000000040)}}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)) r2 = memfd_create(&(0x7f0000000040)="000000008c00", 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000200)=""/68, 0x44}], 0x2) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r1, r2, &(0x7f00000ddff8), 0x1020026fd) [ 261.923999] NFS: bad mount option value specified: vmnet0wlan1 [ 261.942216] attempt to access beyond end of device [ 261.947260] loop2: rw=1, want=3663, limit=112 05:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/174, 0x1a, 0xae, 0x1}, 0x20) [ 261.999408] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 262.020641] attempt to access beyond end of device [ 262.058801] loop2: rw=1, want=3664, limit=112 [ 262.068332] attempt to access beyond end of device [ 262.086809] loop2: rw=1, want=3665, limit=112 [ 262.129901] attempt to access beyond end of device [ 262.166563] loop2: rw=1, want=3714, limit=112 [ 262.202768] attempt to access beyond end of device [ 262.207776] loop2: rw=1, want=3715, limit=112 [ 262.221055] attempt to access beyond end of device [ 262.231962] loop2: rw=1, want=3716, limit=112 [ 262.236572] attempt to access beyond end of device [ 262.261155] loop2: rw=1, want=3717, limit=112 [ 262.266675] attempt to access beyond end of device [ 262.281907] loop2: rw=1, want=3726, limit=112 [ 262.286516] attempt to access beyond end of device [ 262.293288] loop2: rw=1, want=3727, limit=112 [ 262.300579] attempt to access beyond end of device [ 262.306572] loop2: rw=1, want=3728, limit=112 [ 262.312922] attempt to access beyond end of device [ 262.318040] loop2: rw=1, want=3729, limit=112 [ 262.327548] attempt to access beyond end of device [ 262.332604] loop2: rw=1, want=7825, limit=112 [ 262.342288] attempt to access beyond end of device [ 262.347230] loop2: rw=1, want=11921, limit=112 [ 262.357144] attempt to access beyond end of device [ 262.362109] loop2: rw=1, want=16017, limit=112 [ 262.371820] attempt to access beyond end of device [ 262.376766] loop2: rw=1, want=20113, limit=112 [ 262.386594] attempt to access beyond end of device [ 262.391542] loop2: rw=1, want=24209, limit=112 [ 262.402165] attempt to access beyond end of device [ 262.407101] loop2: rw=1, want=28305, limit=112 [ 262.417049] attempt to access beyond end of device [ 262.422044] loop2: rw=1, want=32401, limit=112 [ 262.428738] attempt to access beyond end of device [ 262.433836] loop2: rw=1, want=32993, limit=112 05:51:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) getsockopt$inet_mtu(r3, 0x0, 0x29, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8982, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x0, @loopback}}) close(r3) dup3(r1, r2, 0x0) 05:51:28 executing program 1: mkdir(&(0x7f0000027000)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400001, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000900)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000540)='vmnet0wlan1\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000080), 0x8) socket$nl_generic(0x10, 0x3, 0x10) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000340)=@assoc_value, &(0x7f0000000580)=0x8) fdatasync(0xffffffffffffffff) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) semop(0x0, &(0x7f0000000040)=[{}, {0x6, 0x400, 0x1000}, {0x1, 0x0, 0x800}, {0x1, 0x4, 0x1000}, {0x2, 0x7f, 0x800}, {0x3, 0x4, 0x1000}], 0x6) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x400448c9, &(0x7f0000000000)={0x0, &(0x7f0000000480)}) 05:51:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) 05:51:28 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) read(r2, &(0x7f0000000140)=""/43, 0x2b) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000040000)) dup2(r0, r2) tkill(r1, 0x1000000000015) 05:51:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x11, 0x0, 0x16b5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:51:28 executing program 2: capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00000002c0)) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) migrate_pages(r1, 0x1d, &(0x7f0000000100), &(0x7f0000000140)) [ 263.329881] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 263.346419] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 263.368893] NFS: bad mount option value specified: vmnet0wlan1 [ 263.379401] attempt to access beyond end of device [ 263.386233] loop2: rw=1, want=130, limit=112 [ 263.399205] attempt to access beyond end of device [ 263.414112] loop2: rw=1, want=131, limit=112 [ 263.425363] attempt to access beyond end of device 05:51:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 263.437542] loop2: rw=1, want=132, limit=112 [ 263.457525] attempt to access beyond end of device [ 263.471010] loop2: rw=1, want=133, limit=112 05:51:28 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) [ 263.492460] attempt to access beyond end of device [ 263.526690] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 263.550138] loop2: rw=1, want=142, limit=112 [ 263.571730] buffer_io_error: 42 callbacks suppressed [ 263.571750] Buffer I/O error on dev loop2, logical block 141, lost async page write [ 263.617024] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 263.642815] attempt to access beyond end of device [ 263.665861] loop2: rw=1, want=143, limit=112 05:51:28 executing program 5: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 263.703596] Buffer I/O error on dev loop2, logical block 142, lost async page write [ 263.753224] attempt to access beyond end of device [ 263.773230] loop2: rw=1, want=144, limit=112 [ 263.777827] Buffer I/O error on dev loop2, logical block 143, lost async page write [ 263.793549] attempt to access beyond end of device [ 263.812643] loop2: rw=1, want=145, limit=112 05:51:29 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) 05:51:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 263.845785] Buffer I/O error on dev loop2, logical block 144, lost async page write [ 263.911273] attempt to access beyond end of device [ 263.933608] loop2: rw=1, want=3609, limit=112 [ 263.993229] attempt to access beyond end of device [ 263.993643] UBIFS error (pid: 8597): cannot open "/dev/sg0", error -22 [ 263.998227] loop2: rw=1, want=3638, limit=112 [ 264.031867] Buffer I/O error on dev loop2, logical block 3637, lost async page write 05:51:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000100)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000000240)}) [ 264.039831] attempt to access beyond end of device [ 264.071682] loop2: rw=1, want=3639, limit=112 [ 264.080826] Buffer I/O error on dev loop2, logical block 3638, lost async page write [ 264.095728] attempt to access beyond end of device [ 264.100766] loop2: rw=1, want=3640, limit=112 [ 264.117627] Buffer I/O error on dev loop2, logical block 3639, lost async page write 05:51:29 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) [ 264.146348] attempt to access beyond end of device [ 264.165003] loop2: rw=1, want=3641, limit=112 05:51:29 executing program 5: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:29 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 264.205805] UBIFS error (pid: 8597): cannot open "/dev/sg0", error -22 [ 264.211228] Buffer I/O error on dev loop2, logical block 3640, lost async page write [ 264.236400] attempt to access beyond end of device [ 264.244300] loop2: rw=1, want=3662, limit=112 [ 264.251668] Buffer I/O error on dev loop2, logical block 3661, lost async page write [ 264.319714] attempt to access beyond end of device [ 264.344862] loop2: rw=1, want=3663, limit=112 [ 264.367135] Buffer I/O error on dev loop2, logical block 3662, lost async page write [ 264.369262] UBIFS error (pid: 8620): cannot open "/dev/sg0", error -22 [ 264.383651] attempt to access beyond end of device 05:51:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x11, 0x0, 0x16b5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 264.437630] loop2: rw=1, want=3664, limit=112 [ 264.470288] attempt to access beyond end of device [ 264.478852] loop2: rw=1, want=3665, limit=112 [ 264.487347] attempt to access beyond end of device [ 264.495886] loop2: rw=1, want=3714, limit=112 [ 264.516379] attempt to access beyond end of device [ 264.529591] loop2: rw=1, want=3715, limit=112 [ 264.538874] attempt to access beyond end of device [ 264.563447] loop2: rw=1, want=3716, limit=112 [ 264.576748] attempt to access beyond end of device [ 264.595105] loop2: rw=1, want=3717, limit=112 [ 264.608809] attempt to access beyond end of device [ 264.625225] loop2: rw=1, want=3726, limit=112 [ 264.646697] attempt to access beyond end of device [ 264.673637] loop2: rw=1, want=3727, limit=112 [ 264.678279] attempt to access beyond end of device [ 264.711219] loop2: rw=1, want=3728, limit=112 [ 264.730245] attempt to access beyond end of device [ 264.735291] loop2: rw=1, want=3729, limit=112 [ 264.778691] attempt to access beyond end of device [ 264.790015] loop2: rw=1, want=7825, limit=112 [ 264.812420] attempt to access beyond end of device [ 264.817390] loop2: rw=1, want=11921, limit=112 [ 264.832233] attempt to access beyond end of device [ 264.837287] loop2: rw=1, want=16017, limit=112 [ 264.852326] attempt to access beyond end of device [ 264.857290] loop2: rw=1, want=20113, limit=112 [ 264.871928] attempt to access beyond end of device [ 264.876919] loop2: rw=1, want=24209, limit=112 [ 264.891432] attempt to access beyond end of device [ 264.896442] loop2: rw=1, want=28305, limit=112 [ 264.910949] attempt to access beyond end of device [ 264.916011] loop2: rw=1, want=32401, limit=112 [ 264.924953] attempt to access beyond end of device [ 264.929938] loop2: rw=1, want=32993, limit=112 05:51:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 05:51:30 executing program 5: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:30 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:30 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 05:51:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000140)="b805000000b9008000000f01c1f080a4b000600000000fc3180f09c744240000000000c744240200080000c7442406000000000f0114240f08f3a5650f050f20da0f01cf", 0x44}], 0x1, 0x1, &(0x7f0000000380), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000020000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000000)="f2a766ba610066ed48b813c4830f000000000f23d00f21f835300000000f23f866ba2000edc441175d392e67450f01cb0fc72cbe67400f001066ba4100b0a8ee36420f015900", 0x46}], 0x1, 0x0, &(0x7f0000000100), 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000240)) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f00000001c0)={0x11, 0x0, 0x16b5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 265.333351] UBIFS error (pid: 8645): cannot open "/dev/sg0", error -22 05:51:30 executing program 4: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:30 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 265.368056] UBIFS error (pid: 8650): cannot open "/dev/sg0", error -22 05:51:30 executing program 5: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 05:51:30 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 05:51:30 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f54581372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a6b03fbe9c0ec68357e1fbe52ed77b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b55548b845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff64394fd6a10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b62ed7676706d40bc5c80e376980b81", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 265.801339] UBIFS error (pid: 8671): cannot open "/dev/sg0", error -22 05:51:31 executing program 5: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:31 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 265.957203] UBIFS error (pid: 8681): cannot open "/dev/sg0", error -22 05:51:31 executing program 5: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:31 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:31 executing program 3: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:31 executing program 5: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:31 executing program 4: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) 05:51:31 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)}, 0x0) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000001100)='ubifs\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000001200)=@nfc, &(0x7f00000012c0)=0x80, 0x80000) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000280)=0x8) clone(0x4000000000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 05:51:31 executing program 0: socket$inet6(0xa, 0x3, 0x6) r0 = socket$inet6(0xa, 0x802, 0x80000003) ioctl(r0, 0x8912, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000240)={{0xd0, 0x3}, {0x2c9}, 0x6, 0x7, 0x200}) r3 = gettid() ioctl$RTC_PIE_OFF(r2, 0x7006) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r1, 0x8, r3) timer_create(0x1, &(0x7f0000000000)={0x0, 0x2f, 0x0, @tid=r3}, &(0x7f0000000100)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r5 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r5, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r5, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$int_in(r5, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r5, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) sendto$inet(r5, &(0x7f0000000a00)="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", 0x481, 0x0, &(0x7f000069affb)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f00004b3fff), 0x0, 0x0, &(0x7f00002b4000)={0x2, 0x4e20, @loopback}, 0x10) [ 266.706622] UBIFS error (pid: 8721): cannot open "/dev/sg0", error -22 05:51:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0xfffffff0, 0x400300}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 05:51:32 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:32 executing program 3: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r2, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendmmsg$alg(r1, &(0x7f0000001b80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000000)="1e", 0x1}], 0x1, &(0x7f0000001580)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/84, 0x54}], 0x1, &(0x7f0000000080)=""/50, 0x32}, 0x0) 05:51:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x2]}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5ae8}}) 05:51:32 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:32 executing program 1: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000300)="0501000a0200000066f6ffffc8030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef959c6311b9f38d14437bfd811ee4652fce680409edcceb2996aa5c1397198f", 0x59, 0x400}], 0x0, &(0x7f0000000240)) 05:51:32 executing program 3: write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f00000003c0)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) r2 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0x0, 0x101400) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x9, 0x10000, 0xfffffffffffffffd, 0xff, 0x0, 0x1, 0x2000, 0x4, 0x80, 0x7, 0x4, 0x4, 0x9, 0x6, 0x10001, 0x10000, 0x80, 0x5, 0x7f, 0x5, 0x4, 0x100, 0xf1, 0xfcb, 0xfff, 0x7, 0x9, 0x8, 0xfffffffffffff800, 0x100000000, 0x2, 0xaef, 0x6, 0xd8c, 0x27a, 0x1, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000000140)}, 0x8000, 0x7, 0x0, 0x7, 0x8, 0x3, 0x2a}, r1, 0x10, r2, 0x8) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000380)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4400) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r5 = memfd_create(&(0x7f0000000e40)="0000000000007225f78380807dde5053601841a0d0f82b74374852b01f125997622dc4a5e71d2ce5ac32ff90824fa25e59073487cf36ad576e32926b04894da740f7e9c0ffb42c356a1f285bfc8f0b8c6f72ef151dab4c5c2a5a751f04bfc69ac5c3b5168a6d13d826b1ed0c7527d58f54adc12fca1f25c8fc2586ea4d90f84dabcdec291fb780a39a117d12b0893b182098dceed33b222a1d413709ae355d4d297fe42c5d4e9d8bbd9d0c709cae47e88f8aa22a505b3e995b501f0d3753cd3510e87436612b401305f316177f6d4d4c70fd9d2621c3707ad88da7852596d89a59cb74505e675ac6ebc03faa3ee99889176b571135031afc973c52c5f6437b8143002b30d8fb92011c4994cc024e40497b2daeb06ad5308af486d0178a418f6bdb6940f07dc6e5cf1a3c852b401e3ecec45d22fd687928411b83f68bf7be4b21fdf0033cf949b8a76aa65d68ad885967c2cc3c2d60ec74fcf5de162c94ffe3e15775c1a1cfd9818d4c17a2f8d0a7302538f079e7b128ef123c8bb909000000000000003814c2aea86c35fbf4244a64635d32ff12e4dcb3df56e5d5d3882a9984993f8a7fef72d875d21c1e3bb2bc3e6e79a2b6d322f710f0378abc2095d32139e39f3223db9961309295e4c3c8e1b0001dd757aa000000000000000000000000000008eca80c7b0c", 0x0) write$binfmt_elf64(r0, &(0x7f0000000980)=ANY=[@ANYBLOB="60854c46d30000000000000003003e000026ce09d6c02d7a0b0000004000000000000000000000000000009700eeff00e700000000ff0f0000000000000000000000000000000000000000000000000000000000000000000000000093da5d2a00cc0ab67e098eabfdc6cdff2caf37d6750e3068e5333ff10fa7c8301d09e0c27457e515cf33823f1497de59422e5ddb6bce3cc5bd42c3689a26875882b75ef70add353d8c7e842485416479c8658890b8531bfe09d78920fca873236235109e"], 0xc0) execveat(r5, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f0000000740)=[&(0x7f00000002c0)='lo-keyring/\x00', &(0x7f0000000500)='/proc/self/net/pfkey\x00', &(0x7f0000000540)='/proc/self/net/pfkey\x00', &(0x7f0000000580)='bond_slave_0\x00', &(0x7f0000000600)='ppp0F$vboxnet0trusted/ppp1\x00', &(0x7f0000000640)='/proc/self/net/pfkey\x00', &(0x7f00000006c0)='syzkaller1\x00'], 0x1000) creat(&(0x7f0000000700)='./bus\x00', 0x0) getpgid(r4) fchdir(r5) ioctl$TIOCCBRK(r5, 0x5428) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0x0, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x617, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) setsockopt$inet6_MCAST_LEAVE_GROUP(r5, 0x29, 0x2d, &(0x7f0000000800)={0x7fff, {{0xa, 0x4e20, 0x20, @ipv4={[], [], @remote}, 0x7}}}, 0x88) creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x100, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) 05:51:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getpgrp(0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) clock_settime(0x0, &(0x7f0000000400)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x2882000, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0xd721}}]}) geteuid() mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0x0, 0x2012, r0, 0x0) mlockall(0x5) [ 267.295401] EXT4-fs (loop5): unsupported inode size: 143 [ 267.444199] EXT4-fs (loop5): unsupported inode size: 143 [ 267.504956] sched: DL replenish lagged too much 05:51:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x2]}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5ae8}}) 05:51:32 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@local, 0x51, r1}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"627269646765300000017fffffff00"}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, &(0x7f00000003c0)=0x14) socket(0x3, 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x0, 0x3ff, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0x4, @mcast1, 0x5}}}, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) dup3(0xffffffffffffffff, r2, 0x80000) 05:51:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000300)="0501000a0200000066f6ffffc8030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef959c6311b9f38d14437bfd811ee4652fce680409edcceb2996aa5c1397198f", 0x59, 0x400}], 0x0, &(0x7f0000000240)) [ 267.993512] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.004925] bridge0: port 1(bridge_slave_0) entered disabled state 05:51:33 executing program 3: r0 = memfd_create(&(0x7f00000000c0)="7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="480100000000000006000000acea7fc396be461c8757135f451c400a"], 0x1c) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0xf401, 0x0, 0x0, @tick=0xfdffffff, {}, {}, @connect}], 0xffffff76) 05:51:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x2]}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5ae8}}) [ 268.160209] EXT4-fs (loop5): unsupported inode size: 143 05:51:33 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0xc0046209, 0x706000) [ 268.267541] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.274049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.280808] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.287245] bridge0: port 1(bridge_slave_0) entered forwarding state 05:51:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000300)="0501000a0200000066f6ffffc8030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef959c6311b9f38d14437bfd811ee4652fce680409edcceb2996aa5c1397198f", 0x59, 0x400}], 0x0, &(0x7f0000000240)) [ 268.404914] device bridge0 entered promiscuous mode [ 268.415752] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.460170] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.466849] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.499271] device bridge0 left promiscuous mode [ 268.511019] EXT4-fs (loop5): unsupported inode size: 143 [ 268.554205] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.560656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.567429] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.573850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.603385] device bridge0 entered promiscuous mode [ 268.609402] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 05:51:33 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getpgrp(0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) clock_settime(0x0, &(0x7f0000000400)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x2882000, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0xd721}}]}) geteuid() mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0x0, 0x2012, r0, 0x0) mlockall(0x5) 05:51:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000000c0)={0x81, 0x0, [0x2]}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000080), &(0x7f0000000240)=0x4) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000140)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x5ae8}}) 05:51:33 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000200)=0x4000000000007fff) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f000000d000), &(0x7f0000001000)=0xfea6) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)) 05:51:33 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@local, 0x51, r1}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"627269646765300000017fffffff00"}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, &(0x7f00000003c0)=0x14) socket(0x3, 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x0, 0x3ff, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0x4, @mcast1, 0x5}}}, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) dup3(0xffffffffffffffff, r2, 0x80000) [ 268.777123] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.784514] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.793204] device bridge0 left promiscuous mode 05:51:33 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000001880)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000300)="0501000a0200000066f6ffffc8030000ec000000010000000000000000000000002000000020000000010000000000006e5fbe5a0000ffff53ef959c6311b9f38d14437bfd811ee4652fce680409edcceb2996aa5c1397198f", 0x59, 0x400}], 0x0, &(0x7f0000000240)) [ 268.846932] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.853492] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.861431] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.867951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.876962] device bridge0 entered promiscuous mode [ 268.944323] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 05:51:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB='\x00\x00\x00\n@\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x400) fcntl$setstatus(r3, 0x4, 0x4800) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe69) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) [ 269.179295] EXT4-fs (loop5): unsupported inode size: 143 05:51:34 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@local, 0x51, r1}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"627269646765300000017fffffff00"}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, &(0x7f00000003c0)=0x14) socket(0x3, 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x0, 0x3ff, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0x4, @mcast1, 0x5}}}, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) dup3(0xffffffffffffffff, r2, 0x80000) [ 269.261969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 05:51:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getpgrp(0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) clock_settime(0x0, &(0x7f0000000400)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x2882000, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0xd721}}]}) geteuid() mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0x0, 0x2012, r0, 0x0) mlockall(0x5) [ 269.480319] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.487520] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.527890] device bridge0 left promiscuous mode [ 269.616180] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.623050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.631604] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.638353] bridge0: port 1(bridge_slave_0) entered forwarding state 05:51:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 269.864543] device bridge0 entered promiscuous mode 05:51:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:51:35 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:35 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:35 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8082, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@local, 0x51, r1}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"627269646765300000017fffffff00"}) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, &(0x7f00000003c0)=0x14) socket(0x3, 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000008c0)={0x0, @in6={{0xa, 0x0, 0x3ff, @mcast1}}}, 0x84) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r3, @in6={{0xa, 0x4e21, 0x4, @mcast1, 0x5}}}, 0x84) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) dup3(0xffffffffffffffff, r2, 0x80000) [ 270.120783] dccp_close: ABORT with 1 bytes unread 05:51:35 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB='\x00\x00\x00\n@\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x400) fcntl$setstatus(r3, 0x4, 0x4800) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe69) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 05:51:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 270.227111] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.234771] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.305198] device bridge0 left promiscuous mode 05:51:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, &(0x7f0000d1b000), 0x0, &(0x7f000012e000)}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getpgrp(0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) clock_settime(0x0, &(0x7f0000000400)) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x2882000, &(0x7f00000002c0)={[{@mode={'mode', 0x3d, 0xd721}}]}) geteuid() mmap(&(0x7f0000ffc000/0x3000)=nil, 0x200000, 0x0, 0x2012, r0, 0x0) mlockall(0x5) [ 270.406721] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.413237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.419944] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.426403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.451779] device bridge0 entered promiscuous mode [ 270.473233] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 05:51:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:51:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB='\x00\x00\x00\n@\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x400) fcntl$setstatus(r3, 0x4, 0x4800) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe69) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) 05:51:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 05:51:36 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f00000004c0)) 05:51:36 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:36 executing program 3: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0x4) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0xfffffffffffffcc2) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000380)=0xee, 0x4) setsockopt$sock_int(r3, 0x1, 0x23, &(0x7f00000005c0)=0x8a, 0x4) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000002c0)={@loopback, 0x0}, &(0x7f0000000880)=0x340) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x400, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x0, 0x400000) ioctl$VHOST_SET_VRING_KICK(r5, 0x4008af20, &(0x7f0000000400)={0x3, r6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000900)={r4, 0x1, 0x6, @remote}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@ipv4={[], [], @multicast1}, 0xfff, 0x0, 0xff, 0x9, 0x200, 0x10001, 0x4}, &(0x7f0000000300)=0x20) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x10, r0, 0x180000000) r7 = socket$inet6(0xa, 0x4, 0x80000000) bind$inet(r3, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) r8 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x80, 0x0) write$P9_RLERRORu(r8, &(0x7f0000000a40)=ANY=[@ANYBLOB="64e5ca83f15341e44663bcbe651f13a1681e716c8347a1c8bd4cf42b06d7264c8f396913b9d7baa953cd837658e4ef688cb8fe0b900ac902d42503741eb9d5114bd32ae60b0b45888c5a0903b087b152fb8d88275e58ec833f6ebeae35b60f806b5074f2cdc8263322a765a67d2aeb054c3e4ebd7256607cd4b2317ec8bfe5bad42822abc91e19bb863f13025734c54275c110934a919f6b279c90a035209537dd11146a"], 0xa4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) epoll_create(0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xffffff09) getsockopt$sock_linger(r7, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000580)=0x8) connect$llc(r2, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) getrandom(&(0x7f0000000100)=""/147, 0x93, 0x3) sendmmsg(r2, &(0x7f0000001380), 0x3fffff1, 0x40) 05:51:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) 05:51:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 271.411703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.505271] device lo entered promiscuous mode 05:51:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000480)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x0, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 271.739507] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(19395375814433) <= P.seqno(0) <= S.SWH(19395375814507)) and (P.ackno exists or LAWL(59400329753885) <= P.ackno(59400329753887) <= S.AWH(59400329753887), sending SYNC... [ 271.772180] bond0: Releasing backup interface bond_slave_1 [ 271.892461] dccp_close: ABORT with 1061 bytes unread 05:51:37 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 05:51:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB='\x00\x00\x00\n@\x00\x00'], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000280)=0x400) fcntl$setstatus(r3, 0x4, 0x4800) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) setsockopt(r5, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r5, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe69) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) sendmmsg(r5, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, &(0x7f00000098c0), 0x0, 0x1}}], 0x1, 0x0) [ 272.019050] syz-executor2 (8920) used greatest stack depth: 14888 bytes left 05:51:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) [ 272.133161] device lo left promiscuous mode 05:51:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) [ 272.415823] dccp_check_seqno: Step 6 failed for RESET packet, (LSWL(752523855767) <= P.seqno(0) <= S.SWH(752523855841)) and (P.ackno exists or LAWL(281175512074844) <= P.ackno(281175512074845) <= S.AWH(281175512074845), sending SYNC... [ 272.461277] device lo entered promiscuous mode 05:51:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) [ 272.510066] syz-executor2 (8937) used greatest stack depth: 11536 bytes left [ 272.543659] dccp_close: ABORT with 1061 bytes unread [ 272.638190] device lo entered promiscuous mode 05:51:37 executing program 0: r0 = socket(0xa, 0x5, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") sendmsg$rds(r0, &(0x7f0000000a40)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0x34000}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 05:51:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:37 executing program 4: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x140, 0x0) r1 = open(&(0x7f00007e2ff8)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fcntl$getflags(r2, 0x401) [ 272.685056] bond0: Releasing backup interface bond_slave_1 05:51:37 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x20040, 0x0) mount$9p_tcp(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=tcp,', {'port'}}) 05:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:38 executing program 4: prctl$setmm(0x23, 0x2, &(0x7f0000ffb000/0x4000)=nil) prctl$setmm(0x23, 0x4000000000000001, &(0x7f0000ff1000/0x2000)=nil) 05:51:38 executing program 4: r0 = socket$inet(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000240007031dfffd946fa2830020200a0009000400001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 05:51:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f00000000c0)="000000008c00000000000000000000", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, &(0x7f00000ddff8), 0x102000002) ioctl$KVM_GET_PIT2(0xffffffffffffffff, 0x8070ae9f, &(0x7f0000000540)) 05:51:38 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000c40), 0x0, &(0x7f0000000cc0)=""/246, 0xf6}, 0x0) sendmsg$kcm(r0, &(0x7f0000002000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="80", 0x1}], 0x1, &(0x7f0000002040)=ANY=[]}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000680)={&(0x7f0000000280)=@ipx={0x4, 0x0, 0x0, "9fd8e630b3ff"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000640)}, 0x4000080) [ 273.664355] device lo left promiscuous mode [ 273.682622] device lo left promiscuous mode 05:51:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) 05:51:38 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0xf, @fd}]}]}, 0x24c}}, 0x0) 05:51:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x10003, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x4000000fdfdffff}) 05:51:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) 05:51:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0xb3d3}) ioctl$TIOCGLCKTRMIOS(r1, 0x5412, &(0x7f0000000000)={0xd}) 05:51:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x800, 0x0, 0xfffffffffffffffc}, 0x4) 05:51:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307}, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x85d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x5c00, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r1 = geteuid() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0)="14b5051b974bb1df246f4e37723e24d91b4bdd3774163d03ed88c8672bfb841eea69a633d705909b15f547c56c8c070d5c86ebcf50053875a93ba2a88a79220fce551e97c58170b173db8f24b5ee46eb3181acd3a44aeb2ce60ea7abc0977f414212e449e254558a921f913dddbc7c0ca4b2976dde48e165ab0b3addf8154f664f4e617312de35d00ce73c10aa7c3d24492851c9d388b67a771981503e59c0475459a95f611de08a037850fabeb726eafd6a0bf026778189d0bd21b3e31cbacf79782751", 0xc4, 0xffffffffffff0000}], 0x10092, &(0x7f0000001740)={[{@nodatasum='nodatasum'}, {@notreelog='notreelog'}, {@space_cache_v2='space_cache=v2'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/adsp#\x00'}}, {@obj_type={'obj_type', 0x3d, 'v'}}, {@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}]}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4000000001, 0xb7, &(0x7f0000000440)=""/183, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)) [ 273.882705] device lo entered promiscuous mode [ 273.927939] device lo entered promiscuous mode 05:51:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff00c}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, &(0x7f0000001580)=[{&(0x7f00000002c0)="193a30b8", 0x4}], 0x1, &(0x7f0000001600)}}], 0x1, 0x0) 05:51:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0xc}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x12, &(0x7f0000000080), 0x4) 05:51:39 executing program 5: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x2, [{}, {}]}, 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x38c, 0x0) [ 274.334763] device lo left promiscuous mode 05:51:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) [ 274.454751] device lo left promiscuous mode 05:51:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0fffeff2c707f8f00ff050000000010000100090a", 0x58}], 0x1) [ 274.490700] device lo entered promiscuous mode 05:51:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x0, &(0x7f00000002c0)=ANY=[], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195, 0x0, 0x0, [], 0x0, 0xfffffffffffffffc}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000008ffc)=0x57bd, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000340)=r1, 0xffffffffffffff9b) r3 = socket$inet(0x2, 0x200000002, 0x401) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f00000000c0)={r5, 0x1, 0x6}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000440)={0x0, @in6={{0xa, 0x4, 0xffffffff7fffffff, @mcast2, 0xfffffffffffff000}}, 0xfffffffffffffff8, 0xfffffffffffffe00, 0x8, 0x5, 0x3}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000300)={r7, 0x101}, &(0x7f0000000380)=0x8) ioctl$sock_ifreq(r4, 0x0, &(0x7f0000000400)={'ip6tnl0\x00', @ifru_hwaddr=@remote}) ioctl$sock_ifreq(r4, 0x8991, &(0x7f0000000040)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x2080, 0x0) ioctl$VHOST_NET_SET_BACKEND(r8, 0x4008af30, &(0x7f0000000200)={0x2}) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xb) ioctl$sock_SIOCGIFCONF(r4, 0x8910, &(0x7f0000000240)=@req) socket$inet6_udp(0xa, 0x2, 0x0) connect$netlink(r3, &(0x7f0000000040)=@unspec, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x8000, 0x3f}, 0x2c) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r5, 0x1, 0x6, @link_local}, 0x10) r10 = accept$inet(r9, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) fcntl$dupfd(r3, 0x406, r10) 05:51:39 executing program 0: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000105ffc)=0x10000, 0x4) recvmsg(r0, &(0x7f0000001340)={&(0x7f0000000000), 0x80, &(0x7f0000001300)}, 0x1) 05:51:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307}, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x85d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x5c00, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r1 = geteuid() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0)="14b5051b974bb1df246f4e37723e24d91b4bdd3774163d03ed88c8672bfb841eea69a633d705909b15f547c56c8c070d5c86ebcf50053875a93ba2a88a79220fce551e97c58170b173db8f24b5ee46eb3181acd3a44aeb2ce60ea7abc0977f414212e449e254558a921f913dddbc7c0ca4b2976dde48e165ab0b3addf8154f664f4e617312de35d00ce73c10aa7c3d24492851c9d388b67a771981503e59c0475459a95f611de08a037850fabeb726eafd6a0bf026778189d0bd21b3e31cbacf79782751", 0xc4, 0xffffffffffff0000}], 0x10092, &(0x7f0000001740)={[{@nodatasum='nodatasum'}, {@notreelog='notreelog'}, {@space_cache_v2='space_cache=v2'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/adsp#\x00'}}, {@obj_type={'obj_type', 0x3d, 'v'}}, {@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}]}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4000000001, 0xb7, &(0x7f0000000440)=""/183, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)) 05:51:39 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="0000000000e1bfc5ee350c9a6ae19c119a9fe810a44c8c1452aa6e5aa135b8691717cff668405b7aa6028adb76620a1e49df1597110cedffc559155cc4cff7f3f6f50de71099ab6b45bfc65a21ff974d5b95253888b2bbd8b2c4bcf7837d1cac51a43cca7a173e033e317b3283c0910fc7f50acf9bdf77d8d0aabd86a064c223f22f165c6b44657dd489a3e47187e2d182136ef1ae224e98e234c13251b71ecc1319839c8dd74307aa804ab0c74a5b0ea358fda73261a610cf2e6ace85a97735deddeab09a088e03738949873e1a140923c32f318a4fa553d79a8a0e19211f44243e75b90b1fafb73f9a4618cb396896e773") fstat(r0, &(0x7f0000000000)) 05:51:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x3ed, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) [ 274.780561] device lo entered promiscuous mode 05:51:39 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x800000000008031, 0xffffffffffffffff, 0x0) creat(&(0x7f000002bff8)='./file0\x00', 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x3) 05:51:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="0000000000e1bfc5ee350c9a6ae19c119a9fe810a44c8c1452aa6e5aa135b8691717cff668405b7aa6028adb76620a1e49df1597110cedffc559155cc4cff7f3f6f50de71099ab6b45bfc65a21ff974d5b95253888b2bbd8b2c4bcf7837d1cac51a43cca7a173e033e317b3283c0910fc7f50acf9bdf77d8d0aabd86a064c223f22f165c6b44657dd489a3e47187e2d182136ef1ae224e98e234c13251b71ecc1319839c8dd74307aa804ab0c74a5b0ea358fda73261a610cf2e6ace85a97735deddeab09a088e03738949873e1a140923c32f318a4fa553d79a8a0e19211f44243e75b90b1fafb73f9a4618cb396896e773") fstat(r0, &(0x7f0000000000)) 05:51:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="0000000000e1bfc5ee350c9a6ae19c119a9fe810a44c8c1452aa6e5aa135b8691717cff668405b7aa6028adb76620a1e49df1597110cedffc559155cc4cff7f3f6f50de71099ab6b45bfc65a21ff974d5b95253888b2bbd8b2c4bcf7837d1cac51a43cca7a173e033e317b3283c0910fc7f50acf9bdf77d8d0aabd86a064c223f22f165c6b44657dd489a3e47187e2d182136ef1ae224e98e234c13251b71ecc1319839c8dd74307aa804ab0c74a5b0ea358fda73261a610cf2e6ace85a97735deddeab09a088e03738949873e1a140923c32f318a4fa553d79a8a0e19211f44243e75b90b1fafb73f9a4618cb396896e773") fstat(r0, &(0x7f0000000000)) 05:51:40 executing program 3: syslog(0x2, &(0x7f0000001980), 0x0) [ 275.043155] device lo left promiscuous mode [ 275.047848] device lo left promiscuous mode 05:51:40 executing program 3: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, &(0x7f0000000100), 0x7ff) 05:51:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307}, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x85d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x5c00, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r1 = geteuid() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0)="14b5051b974bb1df246f4e37723e24d91b4bdd3774163d03ed88c8672bfb841eea69a633d705909b15f547c56c8c070d5c86ebcf50053875a93ba2a88a79220fce551e97c58170b173db8f24b5ee46eb3181acd3a44aeb2ce60ea7abc0977f414212e449e254558a921f913dddbc7c0ca4b2976dde48e165ab0b3addf8154f664f4e617312de35d00ce73c10aa7c3d24492851c9d388b67a771981503e59c0475459a95f611de08a037850fabeb726eafd6a0bf026778189d0bd21b3e31cbacf79782751", 0xc4, 0xffffffffffff0000}], 0x10092, &(0x7f0000001740)={[{@nodatasum='nodatasum'}, {@notreelog='notreelog'}, {@space_cache_v2='space_cache=v2'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/adsp#\x00'}}, {@obj_type={'obj_type', 0x3d, 'v'}}, {@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}]}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4000000001, 0xb7, &(0x7f0000000440)=""/183, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)) 05:51:40 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) 05:51:40 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:40 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)="0000000000e1bfc5ee350c9a6ae19c119a9fe810a44c8c1452aa6e5aa135b8691717cff668405b7aa6028adb76620a1e49df1597110cedffc559155cc4cff7f3f6f50de71099ab6b45bfc65a21ff974d5b95253888b2bbd8b2c4bcf7837d1cac51a43cca7a173e033e317b3283c0910fc7f50acf9bdf77d8d0aabd86a064c223f22f165c6b44657dd489a3e47187e2d182136ef1ae224e98e234c13251b71ecc1319839c8dd74307aa804ab0c74a5b0ea358fda73261a610cf2e6ace85a97735deddeab09a088e03738949873e1a140923c32f318a4fa553d79a8a0e19211f44243e75b90b1fafb73f9a4618cb396896e773") fstat(r0, &(0x7f0000000000)) 05:51:40 executing program 3: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, &(0x7f0000000100), 0x7ff) 05:51:40 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:40 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x800000000008031, 0xffffffffffffffff, 0x0) creat(&(0x7f000002bff8)='./file0\x00', 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x3) 05:51:41 executing program 3: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, &(0x7f0000000100), 0x7ff) 05:51:41 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307}, 0x0, 0x5, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x85d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x5c00, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r1 = geteuid() syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x1, &(0x7f00000016c0)=[{&(0x7f00000015c0)="14b5051b974bb1df246f4e37723e24d91b4bdd3774163d03ed88c8672bfb841eea69a633d705909b15f547c56c8c070d5c86ebcf50053875a93ba2a88a79220fce551e97c58170b173db8f24b5ee46eb3181acd3a44aeb2ce60ea7abc0977f414212e449e254558a921f913dddbc7c0ca4b2976dde48e165ab0b3addf8154f664f4e617312de35d00ce73c10aa7c3d24492851c9d388b67a771981503e59c0475459a95f611de08a037850fabeb726eafd6a0bf026778189d0bd21b3e31cbacf79782751", 0xc4, 0xffffffffffff0000}], 0x10092, &(0x7f0000001740)={[{@nodatasum='nodatasum'}, {@notreelog='notreelog'}, {@space_cache_v2='space_cache=v2'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/adsp#\x00'}}, {@obj_type={'obj_type', 0x3d, 'v'}}, {@fowner_gt={'fowner>', r1}}, {@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}]}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4000000001, 0xb7, &(0x7f0000000440)=""/183, 0x0, 0x0, [], 0x0, 0xf}, 0x48) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)) 05:51:41 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:41 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) 05:51:41 executing program 2: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x2) read(r0, &(0x7f0000000100), 0x249) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1011, r0, 0x0) 05:51:41 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) 05:51:41 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) 05:51:41 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x800000000008031, 0xffffffffffffffff, 0x0) creat(&(0x7f000002bff8)='./file0\x00', 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x3) 05:51:41 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1fffffe, 0x800000000008031, 0xffffffffffffffff, 0x0) creat(&(0x7f000002bff8)='./file0\x00', 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x3) 05:51:42 executing program 3: clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') exit(0x0) sendfile(r0, r1, &(0x7f0000000100), 0x7ff) 05:51:42 executing program 3: syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x20, 0x0, 0xb05, 0x70bd2c, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x2000c804}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f00000008c0), 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000680)) gettid() 05:51:42 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/48, 0x30}], 0x1) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x4000100040000) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x4013, r0, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 05:51:42 executing program 4: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) 05:51:42 executing program 0: setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x2, 0xffffffffffffffcb) r0 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x1, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000440)={r1, 0x4, 0x8000}, &(0x7f0000000480)=0x8) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ax25, &(0x7f00000005c0)=0xffffffd6, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) syz_init_net_socket$llc(0x1a, 0x1, 0x0) socket(0x40000000216, 0x5, 0x1) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000600), &(0x7f00000006c0)=0x4) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00c1d43e01387fbfd9127cac9bd3ae804a85aef4e3229f5773b0ca6e09b81e1d65beb5fdcff24244abaada9249d532bf1d74e53530534ecb7018a6ef4b353f02aa04b528f4a70a4af71b3dce65ca75ab5aa7223661a7a31c105c39db3cfb676c47cef5fe5efebf1785fa193ff10cc7dc221f40f3be1ef694a4525cc210d80947353685a6231b6c7fff8d74d38ce747304f495dc2ace10d266486a0511625a81bff0fefd305c07b43e172ca3229f477218bcd9cd0551fc92ef5052b03e361263217a6b5716b08faecb4b96658196794742ed66ab16f828e5bb4ba11ee2983c3b8f819"], 0x1}}, 0x0) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ptrace(0x4208, 0x0) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x48) setsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000540)=@routing={0x0, 0x0, 0x0, 0x3}, 0x8) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000580)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) setgroups(0x0, &(0x7f0000000500)) getrandom(&(0x7f0000000240)=""/40, 0x259, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@dev, @in6=@remote}}, {{@in=@rand_addr}}}, &(0x7f0000000340)=0xe8) ioctl$RNDADDTOENTCNT(r2, 0x40045201, &(0x7f0000000280)=0x1f) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r3, 0x10, &(0x7f0000000840)={&(0x7f00000006c0)=""/47, 0x2f}}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000008c0)='fou\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$PIO_FONTRESET(r4, 0x4b6d, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001800)=0x100000, 0x0) [ 432.631796] INFO: task syz-executor1:9160 blocked for more than 140 seconds. [ 432.639152] Not tainted 4.19.0-next-20181031+ #102 [ 432.644731] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 432.652883] syz-executor1 D20872 9160 5702 0x00000004 [ 432.658560] Call Trace: [ 432.661163] __schedule+0x8cf/0x21d0 [ 432.665003] ? rcu_softirq_qs+0x20/0x20 [ 432.668993] ? do_raw_spin_unlock+0xa7/0x330 [ 432.673481] ? __sched_text_start+0x8/0x8 [ 432.677676] ? zap_class+0x640/0x640 [ 432.681381] ? zap_class+0x640/0x640 [ 432.685159] ? __set_page_dirty_buffers+0x36f/0x810 [ 432.690173] ? find_held_lock+0x36/0x1c0 [ 432.694274] ? zap_class+0x640/0x640 [ 432.697984] schedule+0xfe/0x460 [ 432.701346] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 432.706629] ? __schedule+0x21d0/0x21d0 [ 432.710598] ? find_held_lock+0x36/0x1c0 [ 432.714701] ? wait_for_completion+0x41f/0x8a0 [ 432.719275] schedule_timeout+0x1cc/0x260 [ 432.723519] ? usleep_range+0x1a0/0x1a0 [ 432.727554] ? wait_for_completion+0x41f/0x8a0 [ 432.732196] ? trace_hardirqs_off_caller+0x300/0x300 [ 432.737298] wait_for_completion+0x427/0x8a0 [ 432.741755] ? vivid_stop_generating_vid_cap+0x291/0x93b [ 432.747209] ? wait_for_completion_interruptible+0x840/0x840 [ 432.753091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.758627] ? wake_up_q+0x100/0x100 [ 432.762413] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 432.767947] ? rcu_pm_notify+0xc0/0xc0 [ 432.771892] kthread_stop+0x1a4/0x8f0 [ 432.775731] ? kthread_unpark+0x160/0x160 [ 432.779881] ? __lock_is_held+0xb5/0x140 [ 432.784002] vivid_stop_generating_vid_cap+0x2bc/0x93b [ 432.789292] ? vivid_start_generating_vid_cap+0x4c0/0x4c0 [ 432.794884] ? _vb2_fop_release+0x3f/0x2b0 [ 432.799117] ? mutex_trylock+0x2b0/0x2b0 [ 432.803355] ? vivid_fop_release+0x66/0x440 [ 432.807722] ? unlock_page+0x2c2/0x4c0 [ 432.811669] vid_cap_stop_streaming+0x8d/0xe0 [ 432.816155] ? vid_cap_buf_queue+0x310/0x310 [ 432.820550] __vb2_queue_cancel+0x171/0xca0 [ 432.824912] ? lock_downgrade+0x900/0x900 [ 432.829061] ? __vb2_dqbuf.part.5+0x260/0x260 [ 432.833605] ? find_held_lock+0x36/0x1c0 [ 432.837670] ? mark_held_locks+0xc7/0x130 [ 432.841870] ? kasan_check_write+0x14/0x20 [ 432.846141] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 432.851064] ? kasan_check_read+0x11/0x20 [ 432.855320] ? wait_for_completion+0x8a0/0x8a0 [ 432.859905] ? trace_hardirqs_off_caller+0x300/0x300 [ 432.865071] ? vfs_lock_file+0xe0/0xe0 [ 432.868969] vb2_core_streamoff+0x60/0x140 [ 432.873258] __vb2_cleanup_fileio+0x73/0x160 [ 432.877662] vb2_core_queue_release+0x1e/0x80 [ 432.882195] _vb2_fop_release+0x1d2/0x2b0 [ 432.886359] vb2_fop_release+0x77/0xc0 [ 432.890233] vivid_fop_release+0x18e/0x440 [ 432.894530] ? vivid_remove+0x460/0x460 [ 432.898505] v4l2_release+0xfb/0x1a0 [ 432.902266] __fput+0x3bc/0xa70 [ 432.905546] ? dev_debug_store+0x140/0x140 [ 432.909770] ? get_max_files+0x20/0x20 [ 432.913747] ? trace_hardirqs_on+0xbd/0x310 [ 432.918070] ? kasan_check_read+0x11/0x20 [ 432.922267] ? task_work_run+0x1af/0x2a0 [ 432.926329] ? trace_hardirqs_off_caller+0x300/0x300 [ 432.931445] ? filp_close+0x1cd/0x250 [ 432.935312] ____fput+0x15/0x20 [ 432.938588] task_work_run+0x1e8/0x2a0 [ 432.942516] ? task_work_cancel+0x240/0x240 [ 432.946836] ? copy_fd_bitmaps+0x210/0x210 [ 432.951068] ? do_syscall_64+0x9a/0x820 [ 432.955250] exit_to_usermode_loop+0x318/0x380 [ 432.959830] ? __bpf_trace_sys_exit+0x30/0x30 [ 432.964384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.969919] do_syscall_64+0x6be/0x820 [ 432.973853] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 432.979210] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.984171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.989006] ? trace_hardirqs_on_caller+0x310/0x310 [ 432.994121] ? prepare_exit_to_usermode+0x291/0x3b0 [ 432.999181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.004084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.009263] RIP: 0033:0x411021 [ 433.012488] Code: 83 c4 40 c3 48 8d 05 d8 f9 48 00 48 89 04 24 48 c7 44 24 08 0d 00 00 00 e8 ac a8 01 00 0f 0b 48 8d 05 bd f9 48 00 48 89 04 24 <48> c7 44 24 08 0d 00 00 00 e8 91 a8 01 00 0f 0b e8 1a 8f 04 00 e9 [ 433.031470] RSP: 002b:00007ffdaecfce00 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 433.039220] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000411021 [ 433.046506] RDX: 0000001b2fe20000 RSI: 00000000007301d0 RDI: 0000000000000003 [ 433.053827] RBP: 0000000000000000 R08: ffffffff8139bc89 R09: 000000005dabec66 [ 433.061096] R10: 00007ffdaecfcd30 R11: 0000000000000293 R12: 0000000000000000 [ 433.068413] R13: 0000000000000001 R14: 0000000000000040 R15: 0000000000000001 [ 433.075765] ? __phys_addr+0x19/0x120 [ 433.079564] [ 433.079564] Showing all locks held in the system: [ 433.085980] 1 lock held by khungtaskd/1010: [ 433.090291] #0: 0000000006eabd29 (rcu_read_lock){....}, at: debug_show_all_locks+0xd0/0x424 [ 433.098951] 1 lock held by rsyslogd/5564: [ 433.103108] #0: 00000000e191db11 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1bb/0x200 [ 433.111079] 2 locks held by getty/5654: [ 433.115109] #0: 0000000047144fc6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.123376] #1: 00000000d3b9c737 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.132284] 2 locks held by getty/5655: [ 433.136247] #0: 00000000558aa532 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.144529] #1: 00000000b602872e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.153414] 2 locks held by getty/5656: [ 433.157380] #0: 0000000063f36a5b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.165662] #1: 00000000daaf8697 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.174532] 2 locks held by getty/5657: [ 433.178498] #0: 00000000ae9b5219 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.186784] #1: 00000000ecda148b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.195665] 2 locks held by getty/5658: [ 433.199623] #0: 000000002ef14a52 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.207896] #1: 00000000aad670c2 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.216761] 2 locks held by getty/5659: [ 433.220715] #0: 0000000007e8faa8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.228999] #1: 000000006b6eae3f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.238000] 2 locks held by getty/5660: [ 433.242007] #0: 00000000c4baaf4b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x32/0x40 [ 433.250241] #1: 0000000074b634bb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x335/0x1e80 [ 433.259146] [ 433.260809] ============================================= [ 433.260809] [ 433.267866] NMI backtrace for cpu 1 [ 433.271491] CPU: 1 PID: 1010 Comm: khungtaskd Not tainted 4.19.0-next-20181031+ #102 [ 433.279425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.288838] Call Trace: [ 433.291431] dump_stack+0x244/0x39d [ 433.295062] ? dump_stack_print_info.cold.1+0x20/0x20 [ 433.300890] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.306507] nmi_cpu_backtrace.cold.2+0x5c/0xa1 [ 433.311164] ? lapic_can_unplug_cpu.cold.27+0x3f/0x3f [ 433.316346] nmi_trigger_cpumask_backtrace+0x1e8/0x22a [ 433.321617] arch_trigger_cpumask_backtrace+0x14/0x20 [ 433.326797] watchdog+0xb4c/0x1060 [ 433.330331] ? hungtask_pm_notify+0xb0/0xb0 [ 433.334646] ? __kthread_parkme+0xce/0x1a0 [ 433.338873] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 433.343981] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 433.349084] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 433.353717] ? trace_hardirqs_on+0xbd/0x310 [ 433.358058] ? kasan_check_read+0x11/0x20 [ 433.362234] ? __kthread_parkme+0xce/0x1a0 [ 433.366463] ? trace_hardirqs_off_caller+0x300/0x300 [ 433.371552] ? trace_hardirqs_off_caller+0x300/0x300 [ 433.376638] ? lockdep_init_map+0x9/0x10 [ 433.380695] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 433.385789] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.391313] ? __kthread_parkme+0xfb/0x1a0 [ 433.395539] ? hungtask_pm_notify+0xb0/0xb0 [ 433.399877] kthread+0x35a/0x440 [ 433.403252] ? kthread_stop+0x8f0/0x8f0 [ 433.407214] ret_from_fork+0x3a/0x50 [ 433.411125] Sending NMI from CPU 1 to CPUs 0: [ 433.415747] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x6/0x10 [ 433.416659] Kernel panic - not syncing: hung_task: blocked tasks [ 433.429454] CPU: 1 PID: 1010 Comm: khungtaskd Not tainted 4.19.0-next-20181031+ #102 [ 433.437333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.446671] Call Trace: [ 433.449257] dump_stack+0x244/0x39d [ 433.452879] ? dump_stack_print_info.cold.1+0x20/0x20 [ 433.458062] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.463081] panic+0x2ad/0x55c [ 433.466265] ? add_taint.cold.5+0x16/0x16 [ 433.470406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.475952] ? nmi_trigger_cpumask_backtrace+0x1d1/0x22a [ 433.481392] ? nmi_trigger_cpumask_backtrace+0x1c8/0x22a [ 433.486833] watchdog+0xb5d/0x1060 [ 433.490370] ? hungtask_pm_notify+0xb0/0xb0 [ 433.494748] ? __kthread_parkme+0xce/0x1a0 [ 433.498993] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 433.504080] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 433.509175] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 433.513759] ? trace_hardirqs_on+0xbd/0x310 [ 433.518065] ? kasan_check_read+0x11/0x20 [ 433.522199] ? __kthread_parkme+0xce/0x1a0 [ 433.526425] ? trace_hardirqs_off_caller+0x300/0x300 [ 433.531519] ? trace_hardirqs_off_caller+0x300/0x300 [ 433.536712] ? lockdep_init_map+0x9/0x10 [ 433.540764] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 433.545851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.551381] ? __kthread_parkme+0xfb/0x1a0 [ 433.555614] ? hungtask_pm_notify+0xb0/0xb0 [ 433.559929] kthread+0x35a/0x440 [ 433.563496] ? kthread_stop+0x8f0/0x8f0 [ 433.567469] ret_from_fork+0x3a/0x50 [ 433.572229] Kernel Offset: disabled [ 433.575868] Rebooting in 86400 seconds..