0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x600) 16:50:23 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) 16:50:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:50:23 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:50:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x0, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) r1 = openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x40, 0x20) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000680)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg(r2, &(0x7f0000000600)={&(0x7f0000000040)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x28000000}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)="66de511eee4e526543a8842e6e7307e205dab8957d8d617fafc8d285ed49bc7450fec8ddcfb4191ef0a18d24edac5368533094b047eeb8065c532ba2b0b8a8582efbb2e964b58b87c7535e61f695c1f3d77998a2aa5aa75580933263ac026d7b8dfb3ff0408d230f22cf86410f289fdc03c6f83591825265bdb459a12de55afff84e219d3eaf413a1846e7c1ab3fca7af91429047416ebeeda527bed5a", 0x9d}, {&(0x7f00000000c0)="9b2ec73e", 0x4}, {&(0x7f0000000280)="f4234961a50f84d8a94713d4f137a8ca52d068ceaa15c3a9ac7138af20404537c17e098afabe8cd42b5aa4afd4318b438796cad936e973fafb463da6189ab74b5529d6d972be3e181353a3bf3af00845966d3a3b", 0x54}, {&(0x7f0000000300)="81cea842d81d819988851d73adee2293fb567d4553f359f7a6602c32decc4eef7fede7a3790b124db5e9ab5a14ec0736f2adb1bea6797ae3cbe518a5448a4a67736f4c7728021921263cdc5aefd1697d", 0x50}], 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1d8}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:50:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6087, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x0, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:50:23 executing program 4: r0 = socket$inet(0x2, 0x801, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f0000499000)=""/35, &(0x7f000020a000)=0x23e) 16:50:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x0, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:23 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xa00) 16:50:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd9}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x48) prctl$PR_SET_TIMERSLACK(0x1d, 0x7) 16:50:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6800, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:50:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xc00) 16:50:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x0, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:24 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) r0 = syz_open_dev$audion(&(0x7f0000000580)='/dev/audio#\x00', 0x12b65676, 0x400) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vfio/vfio\x00', 0x200102, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20440000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, r4, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x4001) socket$kcm(0x29, 0x5, 0x0) poll(&(0x7f0000000400)=[{r1, 0x8}, {r2, 0x85}, {r3, 0x80}], 0x3, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@broadcast, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4, 0x6, @mcast1, 0x9}, {0xa, 0x4e23, 0x5, @mcast1, 0xfff}, r6, 0x2}}, 0x48) 16:50:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6c00, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0x0, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:24 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x204e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x299, 0x8020000001, &(0x7f0000000180)={0x2, 0x10084e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='highspeed\x00', 0xa) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendto(r0, &(0x7f0000000300)='$', 0x1, 0x1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0x487, 0x1000000}, 0x1500) 16:50:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000e00"}, 0x1c) 16:50:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7400, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0x0, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:24 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xffffffffffffffd8, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140)={0x8}, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) write$binfmt_misc(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a31fd1df0cf5efe28e5a30bef6a6134fb303b1d74e2cd4e5afb94c005f71e1e6370113b62c468f2b67261a5d5c8d41a4cbb33c14430df1646ed44d83a5a5add2df83ed7399d2a7f07aee4130095606596d5409077e69e8be84e06db5764a5f4c062a97d82514f5ba7fc8072ef854312811a0e3456979009ffe71ce6af8766698650c6596532c5cf8a73aa7680cd6db7100acfb9c6e3f49f41ebb3589242535b3954d9d0978bc5c8322330875ffd19c7d4b474feda9ca59afff9634001845deb8089b8c381de0307f58d490d10245e34d81f8a3265b9c5a0c5f314db0a99"], 0x5c) 16:50:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000021800"}, 0x1c) 16:50:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xe00) 16:50:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0x0, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0xb, 0x7, 0x10000209e20, 0x3, 0x1}, 0x2c) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x1d0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 16:50:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a00, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:24 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x0, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:25 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) r1 = shmget(0x3, 0x3000, 0x40, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000000)=""/3) socketpair(0x3, 0x803, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="01040300060004000900bbf7175392ca636c7ffe656cf807631540483373d45c5434bbcc14dce15a3374926948ac13903885c308c6ae556344714f524d6e4160c9911696681b2a5b45c012081ec5b7deb4e2bdd10fb22e3675c18e1e7d334ab010a675f69dce5f08f05c1280ac36915e9be3198749f9c788ccd5cfbcf60b3d59339e3bb9"], &(0x7f00000000c0)=0xe) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x15}, 0x9}, @in6={0xa, 0x4e20, 0x4, @mcast1, 0x9}, @in={0x2, 0x4e20, @rand_addr=0x9f}, @in6={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0x24}, 0x4}]}, &(0x7f0000000280)=0x10) setsockopt$inet6_buf(r2, 0x29, 0xca, &(0x7f0000000080)="0d1cf6", 0x3) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:50:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) sendfile(r2, r1, 0x0, 0x10001) 16:50:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:50:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xedc0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x0, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xf00) 16:50:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x0, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:25 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="5002000090780000"], 0x0) 16:50:25 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:50:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:25 executing program 4: r0 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r0, 0x1, 0x22, &(0x7f0000000000)=0x7ffffffc, 0x4) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000036c0)=""/64, 0x40}}], 0x1, 0x0, 0x0) [ 751.097703][T29580] IPv6 header not found [ 751.102263][T29580] IPv6 header not found 16:50:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x0, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x3f00) 16:50:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:50:25 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x0, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:25 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:25 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) r2 = dup2(r0, r0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) clock_nanosleep(0x0, 0x0, &(0x7f0000000200)={0x77359400}, 0x0) 16:50:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203a, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x5865) [ 751.457481][T30056] IPv6 header not found [ 751.461688][T30056] IPv6 header not found 16:50:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:50:25 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x0, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203b, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x6000) [ 751.742721][T30421] IPv6 header not found [ 751.746972][T30421] IPv6 header not found 16:50:26 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x0, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:26 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000024000"}, 0x1c) 16:50:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203c, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 751.962808][T30617] IPv6 header not found [ 751.967056][T30617] IPv6 header not found 16:50:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x6558) 16:50:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203d, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:27 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x0, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:50:27 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000740)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200001e4) write$P9_RWRITE(r1, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 16:50:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x0, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:27 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000dc7f00"}, 0x1c) 16:50:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203e, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x0, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:28 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x8100) 16:50:28 executing program 4: r0 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x37, 0x20003ff9, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, 0x0, 0x0) 16:50:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x0, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:28 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000fe8000"}, 0x1c) 16:50:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1203f, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 754.020376][T31493] IPv6 header not found [ 754.024577][T31493] IPv6 header not found 16:50:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x0, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:28 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000ffb800"}, 0x1c) [ 754.211963][T31733] IPv6 header not found [ 754.216201][T31733] IPv6 header not found 16:50:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12040, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:28 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:28 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x0, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x1000000) [ 754.470493][T32126] IPv6 header not found [ 754.474740][T32126] IPv6 header not found 16:50:29 executing program 4: r0 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="3666440f50f564ff0941c3c4e2c9975842c4c2a99c7a0866420fe2e33e8f11e6c442019dccd3196f") sendto$unix(r2, 0x0, 0x37, 0x20003ff9, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) accept4$unix(r2, 0x0, 0x0, 0x0) 16:50:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000fec000"}, 0x1c) 16:50:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12041, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x0, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) [ 754.734555][T32336] IPv6 header not found [ 754.738809][T32336] IPv6 header not found 16:50:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x2000000) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x0, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12042, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 754.937307][T32518] IPv6 header not found [ 754.941549][T32518] IPv6 header not found 16:50:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000007fdc00"}, 0x1c) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x0, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 755.144593][ T326] IPv6 header not found [ 755.148870][ T326] IPv6 header not found 16:50:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x1000002e2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$netlink(r1, &(0x7f0000000080)=@unspec, 0xc) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") connect(r0, &(0x7f00000002c0)=@xdp, 0x80) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 16:50:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12043, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x4000000) 16:50:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x0, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000003e800"}, 0x1c) [ 755.420845][ T509] IPv6 header not found [ 755.425103][ T509] IPv6 header not found 16:50:29 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x0, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12044, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000001f400"}, 0x1c) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0x0, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 755.614016][ T780] IPv6 header not found [ 755.618309][ T780] IPv6 header not found 16:50:30 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) [ 755.815705][ T1080] IPv6 header not found [ 755.819898][ T1080] IPv6 header not found 16:50:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000340)={0x20}) sendfile(r0, r1, 0x0, 0xfff) 16:50:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x6000000) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0x0, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fc00"}, 0x1c) 16:50:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12045, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:30 executing program 1: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:30 executing program 1: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0x0, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12046, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000080fe00"}, 0x1c) 16:50:30 executing program 1: setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x0, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:30 executing program 4: 16:50:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xa000000) 16:50:30 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x0, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000c0fe00"}, 0x1c) 16:50:30 executing program 4: 16:50:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x12047, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x0, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 4: 16:50:31 executing program 4: 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x0, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000ff00"}, 0x1c) 16:50:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xc000000) 16:50:31 executing program 4: 16:50:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x40000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x0, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000fff00"}, 0x1c) 16:50:31 executing program 4: 16:50:31 executing program 1: r0 = socket$inet6(0xa, 0x0, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x0, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf0ffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:31 executing program 4: 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x0, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000b8ff00"}, 0x1c) 16:50:31 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xe000000) 16:50:31 executing program 4: 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x0, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:31 executing program 4: 16:50:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:31 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:31 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x0, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xf000000) 16:50:32 executing program 4: 16:50:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000200"}, 0x1c) 16:50:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x0, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:32 executing program 4: 16:50:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x0, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000500"}, 0x1c) 16:50:32 executing program 4: 16:50:32 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x10000000) 16:50:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x0, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 16:50:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000100"}, 0x1c) 16:50:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x0, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:32 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x0, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000200"}, 0x1c) [ 758.647753][ T4482] IPv6 header not found [ 758.651996][ T4482] IPv6 header not found 16:50:33 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x3f000000) 16:50:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x0, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000300"}, 0x1c) [ 758.830587][ T4628] IPv6 header not found [ 758.834785][ T4628] IPv6 header not found 16:50:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x240}}, 0x20) 16:50:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/241, 0x10}], 0x20000000000002f4) ioctl$int_in(r0, 0x40000000005421, &(0x7f00000002c0)=0x7fff) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 16:50:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x5000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:33 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000400"}, 0x1c) [ 759.076675][ T4997] IPv6 header not found [ 759.080864][ T4997] IPv6 header not found 16:50:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x240}}, 0x20) [ 759.124008][ T5004] input: syz1 as /devices/virtual/input/input17 16:50:33 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:33 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x60000000) 16:50:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 759.314418][ T5366] IPv6 header not found [ 759.318658][ T5366] IPv6 header not found 16:50:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000500"}, 0x1c) 16:50:33 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)={'team0\x00'}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 16:50:33 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x240}}, 0x20) 16:50:33 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 759.563977][ T5722] IPv6 header not found [ 759.568265][ T5722] IPv6 header not found 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x0, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102801ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0xc0386106, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x3}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x2a, 0x0, 0x0) 16:50:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x65580000) 16:50:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000600"}, 0x1c) 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x0, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x8000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 759.831560][ T5974] IPv6 header not found [ 759.835784][ T5974] IPv6 header not found 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x0, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a45320, &(0x7f00000004c0)={{0x80}, 'port1\x00'}) dup2(r0, r1) 16:50:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x81000000) 16:50:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) [ 760.038255][ T6190] IPv6 header not found [ 760.042499][ T6190] IPv6 header not found 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(0x0, 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, 0x0) epoll_create(0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) semget$private(0x0, 0x0, 0x0) 16:50:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x9000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:34 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x88a8ffff) [ 760.251381][ T6450] IPv6 header not found [ 760.255628][ T6450] IPv6 header not found 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:50:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 4: 16:50:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 760.498729][ T6738] IPv6 header not found [ 760.502939][ T6738] IPv6 header not found 16:50:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x0, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:34 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:35 executing program 4: 16:50:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:50:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x0, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 760.744383][ T6943] IPv6 header not found [ 760.748630][ T6943] IPv6 header not found 16:50:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xffffa888) 16:50:35 executing program 4: 16:50:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x10000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:50:35 executing program 4: 16:50:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x0, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 761.010686][ T7198] IPv6 header not found [ 761.014939][ T7198] IPv6 header not found 16:50:35 executing program 4: r0 = socket$packet(0x11, 0x20000000003, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000001180)="4e104205fc1be79a3fec5f21c516", 0xe}], 0x1}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000000), 0x11d}}], 0x40000000000001d, 0x0) 16:50:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x0, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000e00"}, 0x1c) [ 761.197253][ T7454] IPv6 header not found [ 761.201488][ T7454] IPv6 header not found [ 761.215606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 761.221414][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 761.227299][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 761.233095][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:50:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1f000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:35 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x100000000000000) 16:50:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x0, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000001000"}, 0x1c) [ 761.414560][ T7702] IPv6 header not found [ 761.418804][ T7702] IPv6 header not found 16:50:35 executing program 4: socketpair(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0xfffffffffffffea0) close(r0) ppoll(0x0, 0xfffffffffffffe89, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) 16:50:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:35 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x0, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:36 executing program 4: [ 761.673578][ T8066] IPv6 header not found [ 761.677860][ T8066] IPv6 header not found 16:50:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000021800"}, 0x1c) 16:50:36 executing program 4: 16:50:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x200000000000000) 16:50:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0x0, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 761.896612][ T8418] IPv6 header not found [ 761.900862][ T8418] IPv6 header not found 16:50:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x20100000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:36 executing program 4: 16:50:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0x0, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x400000000000000) 16:50:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000009681ec1c00"}, 0x1c) 16:50:36 executing program 4: [ 762.141412][ T8628] IPv6 header not found [ 762.145649][ T8628] IPv6 header not found 16:50:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0x0, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x230f0000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:36 executing program 4: [ 762.331816][ T8874] IPv6 header not found [ 762.336074][ T8874] IPv6 header not found 16:50:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:50:36 executing program 4: 16:50:36 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3a200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:36 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x600000000000000) 16:50:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x5, 0x0, 0x0) 16:50:36 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 762.594168][ T9125] IPv6 header not found [ 762.598460][ T9125] IPv6 header not found 16:50:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:50:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:37 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3b200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/wireless\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 762.899387][ T9480] IPv6 header not found [ 762.903625][ T9480] IPv6 header not found 16:50:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:50:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:37 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xa00000000000000) [ 763.082256][ T9685] IPv6 header not found [ 763.086536][ T9685] IPv6 header not found 16:50:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3c200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:50:37 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:37 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:37 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) [ 763.370361][ T9960] IPv6 header not found [ 763.374654][ T9960] IPv6 header not found 16:50:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2990, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:50:37 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 763.457371][T10123] IPv6 header not found [ 763.461584][T10123] IPv6 header not found 16:50:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000024000"}, 0x1c) 16:50:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3d200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xc00000000000000) 16:50:38 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x80000000, "7f95307782ab2bc2a454edf55abf2974418c9dff01d0729f1af523845237d8cf"}) 16:50:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 763.730487][T10321] IPv6 header not found [ 763.734747][T10321] IPv6 header not found 16:50:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3e200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:50:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x0, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c12") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:38 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) [ 763.927190][T10580] IPv6 header not found [ 763.931388][T10580] IPv6 header not found 16:50:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3f000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xe00000000000000) 16:50:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000ffffff8d00"}, 0x1c) [ 764.122880][T10828] IPv6 header not found [ 764.127181][T10828] IPv6 header not found 16:50:38 executing program 4: syz_open_procfs(0x0, &(0x7f0000000500)='net/dev_mcast\x00') 16:50:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) [ 764.311096][T11076] IPv6 header not found [ 764.315300][T11076] IPv6 header not found 16:50:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sockstat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/145, 0x91}], 0x1, 0x0) 16:50:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3f200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000ffffff9100"}, 0x1c) 16:50:38 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:38 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x0, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:38 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xf00000000000000) [ 764.577373][T11453] IPv6 header not found [ 764.581635][T11453] IPv6 header not found 16:50:39 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') 16:50:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x40000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:39 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b0") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x0, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000001cec819600"}, 0x1c) [ 764.827690][T11672] IPv6 header not found [ 764.832006][T11672] IPv6 header not found 16:50:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) nanosleep(&(0x7f0000000140), 0x0) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x0, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x1000000000000000) 16:50:39 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b0") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000fef02fa800"}, 0x1c) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x0, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x40200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 765.044167][T11979] IPv6 header not found [ 765.048436][T11979] IPv6 header not found 16:50:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x3f00000000000000) 16:50:39 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b0") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) finit_module(r0, 0x0, 0x0) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x0, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000ffb800"}, 0x1c) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x0, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) 16:50:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x41200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 765.314197][T12255] IPv6 header not found [ 765.318457][T12255] IPv6 header not found 16:50:39 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:39 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x6000000000000000) 16:50:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x0, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:39 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000007fdc00"}, 0x1c) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrlimit(0x0, &(0x7f0000000080)) 16:50:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x6558000000000000) 16:50:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x42200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:40 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000003e800"}, 0x1c) 16:50:40 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000040)={0x0, 0x0, @ioapic}) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x0, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x43200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:40 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000fffffdef00"}, 0x1c) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x0, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x8100000000000000) 16:50:40 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x0, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x44200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fb8a76fc8e527c0eba8675c0c682aeeaec9f98dd8fa914717285a6c0f2e8870f0876eafe70c10906485e6bfd236327c0d70fa2e76f735bacca94efec2647e5a9", "ecb97bafeea6137461377055ecb5157218f963d386056d7e23ee54a32bdc5578"}) 16:50:40 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x0, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:40 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000001f400"}, 0x1c) 16:50:40 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000000)) 16:50:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x45200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0x0) 16:50:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x0, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x88a8ffff00000000) 16:50:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000fffffff500"}, 0x1c) 16:50:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x0, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_set$uid(0x0, 0x0, 0x0) 16:50:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x46200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x0, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:41 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x3ff, 0x2) open(&(0x7f0000000140)='\x00', 0x101800, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 16:50:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x47200100, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000fc00"}, 0x1c) 16:50:41 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xffffffff00000000) 16:50:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x0, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:41 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x3ff, 0x2) open(&(0x7f0000000140)='\x00', 0x101800, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 16:50:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000080fe00"}, 0x1c) 16:50:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x48000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x0, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:41 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3b5", 0x28}], 0x1}, 0x0) 16:50:42 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x0, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x2, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, 0x0, 0x0) 16:50:42 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x3ff, 0x2) open(&(0x7f0000000140)='\x00', 0x101800, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) syz_open_dev$sndpcmc(&(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', 0x0, 0x77ffc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 16:50:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000c0fe00"}, 0x1c) 16:50:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4c000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, 0x0, 0x0) 16:50:42 executing program 2: ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f00000000c0)=0x202, 0xdd) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, 0x0, 0x0) 16:50:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000a82ff0fe00"}, 0x1c) 16:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x800000080011, r0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) 16:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, 0x0}, 0x0) 16:50:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x68000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000ff00"}, 0x1c) 16:50:42 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000002c0)}}, r1, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) dup2(r0, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x210403) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000100)=0x78) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r3, 0xc034564b, &(0x7f0000000080)={0x0, 0x30314247, 0x4, 0x4000000000000, 0x3, @discrete={0xfff, 0x1000}}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000280)={0x0, {0xffffffff00000000, 0x7ff}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x8000, 0x0, 0xffffff05) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, 0x0}, 0x0) 16:50:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6c000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:42 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000fff00"}, 0x1c) 16:50:42 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, 0x0}, 0x0) 16:50:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000), 0x0) 16:50:43 executing program 4: read$FUSE(0xffffffffffffffff, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x6, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48, 0x7}, 0x0) 16:50:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc)=0x1000, 0x4) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x4, [0x3a6, 0x2, 0x1, 0x9]}, &(0x7f0000000080)=0xc) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x74000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000effdffff00"}, 0x1c) 16:50:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000), 0x0) [ 769.046711][T16627] rdma_op 0000000088680673 conn xmit_rdma (null) 16:50:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000), 0x0) 16:50:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 16:50:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000008dffffff00"}, 0x1c) 16:50:43 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 16:50:43 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0x0, r1, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:43 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x87600000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 16:50:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000091ffffff00"}, 0x1c) 16:50:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x8cffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)}], 0x1}, 0x0) 16:50:44 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0xfffffffffffff801, 0x7f}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000240)={r1, 0xf4, 0x3, 0x20, 0x6, 0x8}, 0x14) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x800, 0x0) ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000100)={0x2, 0x4, 0x1}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000f5ffffff00"}, 0x1c) 16:50:44 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x6, 0x0) preadv(r0, &(0x7f0000000380)=[{0x0, 0x33d}, {&(0x7f0000001400)=""/4096, 0x1000}, {0x0}], 0x3, 0x2) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x81, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000900)=0x0) ioprio_get$pid(0x1, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x7f, 0x5, [0x0, 0x800, 0x0, 0x8, 0x7fff]}, &(0x7f00000006c0)=0x12) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) socket$inet6_udp(0xa, 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xff, 0x20001) io_setup(0xfffffffffffffffb, &(0x7f0000000100)=0x0) io_submit(r4, 0x1, &(0x7f0000000a80)=[&(0x7f0000000a40)={0x0, 0x0, 0x0, 0xb2b176ad10b7ec5d, 0x0, r1, &(0x7f0000000740)="23d191d79325ffd6aea648cfcab0fc", 0xf, 0x6, 0x0, 0x2, r1}]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000940)=0x8, 0x1) getpid() r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff7f, &(0x7f0000000780)="da0373d9a376eefa62ced01d2ffd68ccfa44aa3d6f3418b39771f87d6d235bb8784f4207615de34a34213ac64759a809cf8bd0027c76ddacd76cd12d3759781a32d56be582a2baf3f5e6042029727306ea5d675cfa6a3f51fa7a5f11cde691e7989c191138ec") r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r7, 0x0) write$binfmt_misc(r7, &(0x7f0000000ac0)=ANY=[@ANYRESHEX=r6], 0x12) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r8, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r5, &(0x7f0000000000), 0xfffffce4}]) 16:50:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)}], 0x1}, 0x0) 16:50:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x97ffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:44 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000000)={0x1, 0xe7}) 16:50:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000003233dafb7000"}, 0x1c) 16:50:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)}], 0x1}, 0x0) 16:50:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xc0ed0000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739", 0x14}], 0x1}, 0x0) 16:50:44 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000340)=""/57) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r2, &(0x7f00000001c0)={0x14, 0x88, 0xfa00, {r3, 0x30, 0x0, @ib={0x1b, 0xfffffffffffffffb, 0x46, {"1d6360fc826e50eb858e02303317c0f0"}, 0x1, 0x81, 0x2}}}, 0x90) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) 16:50:45 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7}}], 0x48, 0x7}, 0x0) 16:50:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000540)={0x0, @in={{0x2, 0x0, @initdev}}}, 0x0) 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739", 0x14}], 0x1}, 0x0) 16:50:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000200"}, 0x1c) 16:50:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xe4ffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 770.778512][T18360] rdma_op 00000000854fe976 conn xmit_rdma (null) 16:50:45 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x3ff, 0x2) open(&(0x7f0000000140)='\x00', 0x101800, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)) syz_open_dev$sndpcmc(&(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', 0x0, 0x77ffc) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739", 0x14}], 0x1}, 0x0) 16:50:45 executing program 2: 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b9", 0x1e}], 0x1}, 0x0) 16:50:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000f0ffffff7f00"}, 0x1c) 16:50:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf5ffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:45 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x202000000000000}}, 0x0, 0x6, 0x4, 0x869, 0x8}, &(0x7f0000000100)=0x98) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:45 executing program 2: 16:50:45 executing program 4: 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b9", 0x1e}], 0x1}, 0x0) 16:50:45 executing program 2: 16:50:45 executing program 4: 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b9", 0x1e}], 0x1}, 0x0) 16:50:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000500"}, 0x1c) 16:50:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf6ffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:45 executing program 2: 16:50:45 executing program 4: 16:50:45 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf11", 0x23}], 0x1}, 0x0) 16:50:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000007ffffffff000"}, 0x1c) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf11", 0x23}], 0x1}, 0x0) 16:50:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf9fdffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf11", 0x23}], 0x1}, 0x0) 16:50:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000100"}, 0x1c) 16:50:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) eventfd(0x80000000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfdffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:46 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8b", 0x26}], 0x1}, 0x0) 16:50:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000200"}, 0x1c) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8b", 0x26}], 0x1}, 0x0) 16:50:46 executing program 2: 16:50:46 executing program 4: 16:50:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfeffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8001, 0xfffffffffffffffe, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x2e, 0x4, 0x30, &(0x7f0000ffb000/0x4000)=nil, 0x4}) accept4(r0, &(0x7f00000001c0)=@caif=@dgm, &(0x7f0000000100)=0x80, 0x80000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) open(&(0x7f0000000240)='./file0\x00', 0x40, 0x60) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x4, 0x0, 0x0) 16:50:47 executing program 2: 16:50:47 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8b", 0x26}], 0x1}, 0x0) 16:50:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000300"}, 0x1c) 16:50:47 executing program 4: 16:50:47 executing program 4: 16:50:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffff000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:47 executing program 2: 16:50:47 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3", 0x27}], 0x1}, 0x0) 16:50:47 executing program 4: 16:50:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'ip6gretap0\x00', 0x1000e803}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 16:50:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000400"}, 0x1c) 16:50:47 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3", 0x27}], 0x1}, 0x0) 16:50:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffdf9, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:47 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) 16:50:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='setgroups\x00') write$FUSE_POLL(r0, &(0x7f0000000440)={0x18, 0x0, 0x6, {0x3}}, 0x18) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000000)="05", 0x1) dup2(r3, r4) ioctl$TCFLSH(r3, 0x540b, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x2) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="c86470830ffff3ee323145ac2e56f25abc5e9971", 0x14}], 0x1) getsockname(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) exit_group(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000240)={0x100000000, 0x3, {0x0, 0x1, 0x7fffffff, 0x1, 0x7}}) recvfrom(r5, &(0x7f0000000380)=""/77, 0x4d, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x4, {{0xa, 0x4e23, 0x80000001, @empty, 0x6}}}, 0x88) 16:50:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 16:50:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000500"}, 0x1c) 16:50:47 executing program 4: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 16:50:47 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000007c0)=0x90, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x1c) sendmsg(r0, &(0x7f000001b000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="f67f986af9dc3ba1fe8000000000000087209739ae649266f062bcd978b94585b9bf1100ed8bc3", 0x27}], 0x1}, 0x0) 16:50:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffff7f, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) getpgid(0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e105d77183f320613057ffd7e07900e0413ff26bb45200100000000000003cfe5f0028213ee20600d4ff116eb5", 0x48}], 0x1) 16:50:47 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$alg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="7ada8517851c27a16100f1e8", 0xc}], 0x1, &(0x7f00000001c0)=[@assoc={0x18, 0x117, 0x4, 0x3ff}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x68, 0x117, 0x2, 0x50, "86f5c629c4eb7f3810e1ff8ee934fb9c1264f70bd616c811e9d1d42a7cffcdcca611c5a1eff8ef0a9f0779e43f607f6f499be2abe00f1dd310a0a6b5240002f41fa368c0057a84e0e3a5322c66e2cd8a"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0xffffffff80000000}], 0xf8, 0x10}, 0x8000) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) write$rfkill(r0, &(0x7f0000000040)={0x40, 0x0, 0x2, 0x1}, 0x8) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000600"}, 0x1c) 16:50:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000000), 0x2ac, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 16:50:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffff8c, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:48 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1, 0x0) 16:50:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r0, r1}) 16:50:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:50:48 executing program 2: r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="ce"], 0x1) sendfile(r0, r0, &(0x7f00000000c0), 0xfff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 16:50:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 16:50:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffff97, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:50:48 executing program 1: clock_adjtime(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r1, 0xffffffffffffffaa, &(0x7f0000000080)) 16:50:48 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)) 16:50:48 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x4) write(r0, &(0x7f00000004c0)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'nr0\x00', 0x5a}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) getegid() getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={0x0, 0x8, 0x7fffffff}, &(0x7f0000000380)=0xc) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000480)={'veth0_to_bridge\x00', {0x2, 0x4e21, @broadcast}}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000003c0)={0x410, 0x2, 0x445, 0xffffffff, r2}, &(0x7f0000000400)=0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000440)=0x100000000, 0x4) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40080000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x100, r3, 0x220, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000001}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffff9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x2}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100000000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe325}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1eaaa3ff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="41983872c16175ea8f3ce6d1f5e39f23"}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x1}, 0x804) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffffe4, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:48 executing program 2: r0 = epoll_create(0x6) r1 = epoll_create(0x8) r2 = socket$rds(0x15, 0x5, 0x0) r3 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) r4 = epoll_create(0x46c) r5 = epoll_create(0x400000200) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r0, &(0x7f0000c7f000)) r6 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)) 16:50:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:50:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bpq0\x00\x00\x06\xe0\xff\x00\x00\b\x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)) 16:50:48 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x21, &(0x7f0000000040), 0x10) 16:50:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffff5, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:49 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x4000000003e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000840)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\x1d\xa1\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x02D\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffw\x95\xed\xd0\xff\a\xb6\x03\t\x9d\xa5ii0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x8d41e965388e3f09, 0x0) sendmsg$kcm(r0, 0x0, 0x40000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x802}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1f, 0x0, 0x0, 0x0, 0x0, 0xd2, &(0x7f0000000900)=""/210, 0x41100}, 0x48) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x2c9) perf_event_open(&(0x7f00000007c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xfc57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xfffffffffffffffe, 0x300) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x4000) write$cgroup_int(r2, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xfffffffffffffffe) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, 0x0) 16:50:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = syz_open_dev$mouse(&(0x7f0000000740)='/dev/input/mouse#\x00', 0x3bc5, 0x10000) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f0000000780)={0x1, 0x0, {0x800000000000, 0x7, 0x6, 0xffff}}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000100)={@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x3, 0x2}}, {&(0x7f0000000040)=""/8, 0x8}, &(0x7f0000000080), 0x10}, 0xa0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendmsg(r0, &(0x7f0000000700)={&(0x7f00000001c0)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000240)="9d4d4e6a", 0x4}, {&(0x7f0000000280)="8fd1056cb71cc7084bf0c18dc819ffae8d390842a763f2aa0c361d7a073df6049e013505b6f44375bc68c665ab9473f21a527453e9801a8ed7ba80fd9afe881ddeb1543826bdcb5d45e9d201e35cc991ef6f25fdc8a4386ca70354667ac5b45d2c969fd0c10338fdc7d9b3f1186feedc60fbd152591f3b7704f7d38829c9bd1c6a3cd1555142776f220bbdacfdeba00883485024626390c5de95d236ba9127019b6e812c97b9dda68b44", 0xaa}, {&(0x7f0000000340)="d59beab8cc8d10038e5705790ae4fc49688ea27e7f0e28c378ec222a7e723de05284f6fa8cadce8b6e8c9e8843977e0caefb0f91e264ef56bde9c25a13a78f25a0a209f38787352a48c48f785ea1b059fa37b53cc3cb53e0ba660f8548432265b018a01b12e18da315ce236e1aec5c66d3d7abb8e667d00d0df527eca56f903c69b3e194dbe706fb999367b6750c1fe898c7e6d76b8546f7a125bce61cfca1c575b1ffc0140db4c36ba27f8a732c0d392cc40138497e819b87acea1ba11958e56549cf4c4b04c2ad15", 0xc9}, {&(0x7f0000000440)="be91dfabd63b724bbc55df41aeb234c33a6caae33b8c2322f7b6871c1d0e61ec09ca1539b73d825afc6fafef7c45772042383d421efcc4430c0570c45d7f9d229903e638239bee80120c2b6801a6cbae71d4c84edf5168be1370bd8eb7fd42f894663844344ca80eece3c823e5db1cf7722582bcf19abd0e6ce9435d53ad44aec210634f82b29a4e39158fe154c1f314f36112cc8237a0c0652f62ed78713dca1657d744becffb0b5a29656e4a8de6877f92020b53b0a8ecc023", 0xba}], 0x4, &(0x7f0000000540)=[{0x40, 0x11, 0x8, "c705380f186beb3eb0783702e46135aa861354d4bc2bacf2295a336b67d3722040d1c681c5d18b74ed6f4c"}, {0xa0, 0x105, 0x0, "26e48e32b920391b2095db6ae8d08151bbb6f18a492b81243c741ec955c4c0103e605b3d89ef433807a86c596ad5772fdc44e77b534bbe0bad7203482cf17ff9385428e9ed7b75a8b302f77b285be3dcc773fc5a4776d58b1b5526fffbe95264654aa379abc382f9fe920bfbbca59069c10006261f4db5416324e53ccff05f11452bb4abbab2caa8e014e4f2"}, {0x20, 0x1, 0xffffffffffffffc1, "da38ea6d6a67dc49181d395a3bfef8ef"}, {0x50, 0x111, 0x20, "533829c9b5c987b928b4d4fbe816291efd9eb00662428b51af791dc40d9660b77a1e1834361f4f8d6d39612f7ab70e19e75cdf99eae64adea8b47691bb"}, {0x50, 0x0, 0x7, "52b25424da9faee3085ca967c7fee59338a2119a34dab61e5e90c9578a48bdfec3b8884d554a5840bf38a00dd53c04a0c0490708e0851823a6ece5"}], 0x1a0}, 0x40001) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:50:49 executing program 2: getrandom(&(0x7f00000002c0)=""/33, 0x21, 0x2) 16:50:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x6) 16:50:49 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) 16:50:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffff6, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000e00"}, 0x1c) 16:50:49 executing program 1: socket$kcm(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f00000000c0)=@nfc={0x27, 0x1}, 0x80, 0x0}, 0x0) 16:50:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000580)={r0, &(0x7f0000000080)}, 0x10) 16:50:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) fcntl$dupfd(r1, 0x406, r0) 16:50:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000001000"}, 0x1c) 16:50:49 executing program 4: socketpair$unix(0x1, 0x1000000000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg(r1, &(0x7f00000047c0)={0x0, 0x0, &(0x7f0000004600)=[{0x0}, {0x0}, {&(0x7f0000004340)=""/168, 0xa8}], 0x3}, 0x0) 16:50:49 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x7d, &(0x7f0000000040), 0x10) 16:50:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffffd, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 775.365066][T23995] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 16:50:49 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x6) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000340)={0x2, 0x1587a3b1, 0x7}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000280)) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) setuid(r2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/keycreate\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x51, 0x4) 16:50:49 executing program 2: r0 = socket$kcm(0xa, 0x1000000000003, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f000000c300)={&(0x7f000000c000)=@xdp, 0x80, 0x0}, 0x0) 16:50:49 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x1, {{0x43, 0x3}, 0x1}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000380)="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", 0x1000}], 0x1, 0x0, 0x0, 0x8001}, 0x4044010) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={r0}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) sendmsg(r0, &(0x7f0000003900)={&(0x7f0000000300)=@un=@abs, 0x80, &(0x7f00000038c0)=[{&(0x7f00000037c0)="16710103000000000000443502f1a26a", 0x10}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001380)={0x4, 0x70, 0x3, 0x0, 0x3, 0x7, 0x0, 0x9, 0x48084, 0x2, 0x5, 0x2, 0x8, 0x200, 0x6, 0x4, 0x4, 0x100, 0x1000000000000000, 0x7c, 0x3f, 0xffffffff80000001, 0x200, 0x1, 0x1, 0x400, 0x1, 0x1c5, 0x7, 0xfffffffffffff554, 0x9, 0x101, 0x9129, 0x80000001, 0x9a9f, 0x9, 0x1, 0x4, 0x0, 0x4, 0x1d8c491ddcb7a3a9, @perf_bp={&(0x7f0000000280), 0x1}, 0x1a00, 0x8, 0x4, 0xf, 0x5, 0x7, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400201) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x3) 16:50:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000021800"}, 0x1c) 16:50:49 executing program 4: [ 775.597583][T24272] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 16:50:50 executing program 4: 16:50:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffffe, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000080)) 16:50:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x57}}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="a3375f83dd2586651779c2b1dc11", 0x0, 0x6a9}, 0x28) 16:50:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:50:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\xf4\xb8\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xa71o\xcc\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\a/\xf6\x1f\a]\xd9PJ@\x94 \x9f\x15\x7fVu\xf5\x8d\xf88\x95i\xd9E\x96\x86x\x87\xf7e<\xfdt$x95\xba\xe4C#R\xe1\xe4\xa8', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff3a, &(0x7f0000000100), 0x0, 0x0, 0xfd07}, 0x40000004) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x3, @dev={[], 0x20}, 'dummy0\x00'}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001480)="f3c2589ec7b4f29ce9ffb9340cbc3257f85ecedc6c511771d369de3ceac15993ceacb760f4558232d6fecc99be39fd65e1d1cd8c783a9f015d3e546c8bee59571556ca619a387c0954", 0x49}], 0x1}, 0x40000) 16:50:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x800000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:50 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000000100)=0x68) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:50 executing program 1: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f0000003900)={&(0x7f0000000300)=@un=@abs={0x0, 0x0, 0xffffff7f}, 0x80, 0x0}, 0x0) 16:50:50 executing program 2: 16:50:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000070fbda333200"}, 0x1c) 16:50:50 executing program 2: 16:50:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:50 executing program 1: 16:50:50 executing program 2: 16:50:50 executing program 4: 16:50:50 executing program 1: 16:50:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:50:50 executing program 4: 16:50:51 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6087ffffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:51 executing program 1: 16:50:51 executing program 2: 16:50:51 executing program 4: 16:50:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:50:51 executing program 4: 16:50:51 executing program 1: 16:50:51 executing program 2: 16:50:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x10201, 0x0) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000080)=0x3) sendmsg$kcm(r0, &(0x7f0000000980)={&(0x7f00000001c0)=@rc={0x1f, {0x93f3, 0x80000000, 0x80000001, 0x8, 0xfff, 0x4}, 0x1}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000240)="28ab5fa641a59d0ae27a39031a20f9745938c34ef25ea85e6efdcfc340e1d95256946fc88aa6d153498589697433518c22d0f769497287997da9466223c7afad00456ac9aa3130b59e8382f00148f59247c70492dd684b53b30e353662a27d3a89e85e", 0x63}, {&(0x7f00000002c0)="1aa70f04cc5a79da6d1a6fc8848bc3e2019e6345b16ed7be2fecbe577fb0545f3a0eba1dbb312302d520b0f307877d83752090bbd55f50a50c3223b24b09ea5f1efc9b2c650df59d497cc46f4b2110ace26ba583d7ecef3524839c2d9fdd32fc2f34f16448c0e2d29dccbfd91118c307013fab2782f74fd01270a7d3a7092337371965595ba6a712d05e1718752db4651db32fb4ae09e7c0d7", 0x99}, {&(0x7f0000000380)="60282b9d7aa07483e404ca175a59643bb0ee3b0e33b656a942ad63c0aad574194ec955a7949aef074987027186ed4f2ed055f7b6830b7278a33dc58cb8309b8ae3218215eda2fbe54012c332c8711e2c1167b4b21d2fc546b9c52201a6d30e1ee4d71ee5b149268cfcb2aa6a5497fe8ef00bf347d7a374d3e996ea06f718f28b5cb5af397a6e15d50967d8580aca9cd63708fff51aca5a7e8e6ba6b80fa2ebb9af60f8984c16ea5f402ec36df49a554541f5781613fd13d5d7b2873632776593f6d9ea854772528ca16d6707f893ec22630279", 0xd3}, {&(0x7f0000000480)="ad98369c1ce4be823ce6a01a6fcb6285f5bbeab9ca20c44a04a2a41ecb403979992870503bad458531c68bcb3e081e8d4fc8f1900a90bd563d19aab3ef9790fa55fcc3a60761fc7e4c1e6eee98f0719d3a8a408b727f1c253bbf04e5f39ad0e955d56454507f03873fd6f651742e8ccc9ffd7c3821fde9258bfc3db45648536b05883f57d85c95f11d7dd3520c52bc00aaff4ad4e51b75000cd26dd635c6441f47f64f3c9383bcab2c6e567ab2c49b2029fd3d5dc93c931ae8eaf5a52836d3f8185b372c2f88050a0f069fe23930abb84ddc6f8fb49b4a566aef4c8cc944eb00241f95a3d040a77e82", 0xe9}, {&(0x7f0000000580)="8f92be2301df2f518cf451a140e91fb9bcec24aab703fb792b97f3b7ea6bd3b862b39f6a0768ca599ff1056f75436e1e9ee5ecf340ca1b3b5ed652e7fd50ab8e7ee93dd4a6ff3666ed852909f57ce79b782173c31127b5e0c52e135984ddf7dcaf1ecb815e9ebda579a42dbc585e3732f5992f1dc4bc818f5b85f0c4f9e3c9271c2bb43642b17b0b6721dd1aa0b403abb691e1bb804e0664f9f97e2df9eb246852d1e8c7efea8d096f33b6f92dcd6c0e60400913a9ecacae948ff1ea195b9cc27dc9613326907d", 0xc7}, {&(0x7f0000000680)="710bd9fcc44e3135d00e98cd3b03ea816c2ea4cc0b77ba15d8ce", 0x1a}, {&(0x7f00000006c0)="fb5ff8fa2436216d5494576071ff07a192915a6f59754ec66b727a8d128d20d2400d25d8a60c72bf5a0f673633f7ea761958840c432c9c9fcef3375b3a80c16bd4d235618f8d2173d3ae7c7efae995d37011ae94f02924a467b6ebfcd65281f9dea85370a72d3e4624a591e650a9", 0x6e}, {&(0x7f0000000740)="9c20fd8f9deb56d221bf93c550b2941ce8bec2007ce7df706d5f087819953ada8a38266aa2f979a7fd581f25d9af764cb020d0f4669d01946756a54d5fb302b7b8aca60ee12b8042b3d51f318472de10f4b750bb46a49f1400e2cb3ec4b290946b6cb202179bbb04fed2dd439de9771f2db0b52da91d40905d4eb3b7088be5ced1b1a2b0e2d04d397dbd016f0b15055d01d4a7f72be28162bf0e81de571db04657f4ea17a209737aa651570a7049db87ad065a7c2ce225fc31b69ad408", 0xbd}, {&(0x7f0000000800)="c3c9d0041562ed721faa87603134483f55ec9ef52e2141c705c6307395b7ee9a5cd84071962d03ad035934ccd65825870c5c05ffe075b16daba2eb20f6e824c91f50d1f25b9406d5b764b4e830d8d03eb2edc13d78bca412bf466a4bc94c2cbfb4db75ac6b50", 0x66}], 0x9, &(0x7f0000000940)}, 0x20008080) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000100)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xedc000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:51 executing program 4: 16:50:51 executing program 2: 16:50:51 executing program 1: 16:50:51 executing program 2: 16:50:51 executing program 4: 16:50:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:50:51 executing program 1: 16:50:51 executing program 4: 16:50:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:51 executing program 2: 16:50:51 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:51 executing program 1: 16:50:51 executing program 4: 16:50:51 executing program 2: 16:50:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000024000"}, 0x1c) 16:50:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:51 executing program 1: 16:50:51 executing program 4: 16:50:51 executing program 2: 16:50:52 executing program 1: 16:50:52 executing program 2: 16:50:52 executing program 4: 16:50:52 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000240)="12f4ff07ffffff0421000000f40000000000", 0xffffffffffffff47, 0x4000, 0x0, 0xffffff02) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = getpid() ptrace$peek(0x1, r1, &(0x7f0000000100)) 16:50:52 executing program 1: 16:50:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:50:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf0ffffffffffff, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:52 executing program 4: 16:50:52 executing program 2: 16:50:52 executing program 4: 16:50:52 executing program 2: 16:50:52 executing program 1: 16:50:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x3e4, [0x0, 0x0, 0x0, 0x0, 0x0]}) 16:50:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae88, &(0x7f00000000c0)=ANY=[]) 16:50:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x100000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:52 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio\x00', 0x80000, 0x0) accept$inet(r0, &(0x7f0000000640)={0x2, 0x0, @remote}, &(0x7f0000000680)=0x10) r1 = syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x33) mq_timedreceive(r1, &(0x7f0000000340)=""/252, 0xfc, 0x7, 0x0) r2 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x0, 0x2, 0xfffffffffffffffe, 0x6, 0x0, 0xc0c, 0x2020, 0x4, 0x1, 0x1, 0x4, 0x4, 0x5, 0x8074, 0x7, 0x81, 0x0, 0x7ff, 0x80000000, 0xfffffffffffffffd, 0x8000, 0x5, 0x3ff, 0x4, 0x400, 0x1, 0x0, 0x5, 0x4, 0x0, 0x0, 0x81, 0xff, 0x4, 0x70000000, 0x3, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0xe32a}, 0x72a45b0b0251cc3b, 0x26, 0x5, 0x5, 0xffff, 0x0, 0xffffffffffffecb3}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000004c0)={{0x6, 0x6, 0x3, 0x1ff, 'syz1\x00', 0x7}, 0x0, 0x20000200, 0x0, r3, 0x5, 0x7f, 'syz0\x00', &(0x7f0000000480)=['/dev/swradio#\x00', 'em1\\\x00', '\\\x03eth0(/eth0[-system\x00', '\xa9{em0\\\x00', '\x00'], 0x30, [], [0x7, 0x1, 0x3, 0xfffffffffffffffb]}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000002c0)={0x200, 0x2, 0x4, 0x8, r4}, 0x10) write(r2, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) lsetxattr$trusted_overlay_redirect(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='trusted.overlay.redirect\x00', &(0x7f0000000740)='./file0\x00', 0x8, 0x1) prctl$PR_SVE_GET_VL(0x33, 0x2bec) sendto(r2, &(0x7f0000000440)="56721ae736473f6278c87bd386c6d112000f0012000000000a0000000000000000", 0x11f, 0xffffffffffffffff, 0x0, 0xffffffffffffffd4) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) 16:50:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000ffffff8d00"}, 0x1c) 16:50:52 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000001a00)) stat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) lstat(0x0, 0x0) r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f00000004c0)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eaebe18a3d918e0000000e2ff000100"}) 16:50:52 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000580)=""/246) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$PPPIOCSPASS(r0, 0x80047441, 0x0) 16:50:52 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000580)=""/246) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$PPPIOCSPASS(r0, 0x40047440, 0x0) 16:50:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x200000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000ffffff9100"}, 0x1c) 16:50:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$team(0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002f40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000000, &(0x7f0000002f80)={r3, r4+10000000}) getsockname$packet(r1, &(0x7f0000002fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003000)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000003100)={0x0, @multicast1, @remote}, &(0x7f0000003140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003240)={{{@in6=@initdev, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000003340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000033c0)={{{@in6=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000034c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000038c0)={'vcan0\x00'}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003900)={0x0, @local, @broadcast}, &(0x7f0000003940)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000003980)={0x0, @dev, @dev}, &(0x7f00000039c0)=0xc) recvmsg(r1, &(0x7f0000003b40)={&(0x7f0000003a00)=@hci, 0x80, &(0x7f0000003a80), 0x0, &(0x7f0000003ac0)=""/121, 0x79}, 0x40000000) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000004680)={&(0x7f0000000040), 0xc, &(0x7f0000004640)={&(0x7f0000004240)={0xa0, r2, 0x702, 0x70bd27, 0x25dfdbfc, {}, [{{0x8}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}]}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4}, 0x4000001) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) 16:50:53 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$PPPIOCSPASS(r0, 0x8004745a, &(0x7f0000000100)={0x0, 0x0}) 16:50:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000080)={0x50, 0x0, [{}, {}]}) 16:50:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x300000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000001cec819600"}, 0x1c) 16:50:53 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) write$ppp(r1, &(0x7f00000001c0)="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", 0x1000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast2, @loopback}, &(0x7f0000001240)=0xc) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001280)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000001380)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000013c0)={{{@in=@rand_addr=0x80000001, @in=@local, 0x4e20, 0x7837, 0x4e20, 0x7, 0x0, 0x20, 0x20, 0x33, r2, r3}, {0xffffffffffffff32, 0x9, 0x0, 0x8, 0x9, 0x6, 0x2000000000000000, 0x3}, {0x3, 0x0, 0x8, 0x3}, 0x8, 0x6e6bb5, 0x2, 0x1, 0x1, 0x3}, {{@in=@loopback, 0x4d6, 0xff}, 0x0, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3505, 0x5, 0x2, 0x1f, 0x3, 0x75, 0x9}}, 0xe8) close(r0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[@ANYRESDEC], 0x14) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r0, r1, 0x0) write$binfmt_aout(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB="cc0066074c0100004e000000070000007d020000090000000000000000000000cdffb7f94245a0623ba3e65ca983a6597653acf09f505f74ed00e975e61d153071b14f1512dcde5bf8e78eaadd6077b14fcbff1f4b07a6ff8196f48c160000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x401) 16:50:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f00000037c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003580)=[{{&(0x7f00000001c0)=@nfc, 0x80, &(0x7f0000000100)=[{&(0x7f0000000000)=""/42, 0x2a}], 0x1, &(0x7f00000002c0)=""/194, 0xc2}, 0x5}, {{&(0x7f00000003c0)=@tipc=@name, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1}, 0x7fff}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x2, &(0x7f0000003800)={r1, r2+30000000}) recvmmsg(r0, &(0x7f0000001cc0), 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001280)=ANY=[@ANYBLOB="140000001a00010200000040040000000000000077ec99d501bda06d17cec7950e99588fcd945445aab727409b0850"], 0x1}}, 0x0) 16:50:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x400000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000ffb800"}, 0x1c) 16:50:53 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vxcan1\x00', 0xf) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x18a, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[], 0x1}}, 0x0) sendto$inet(r1, &(0x7f00000006c0)="50893f9085eb9f57cdb68c6dda4997459548526d99bb882c6ed1e16703b4c8b3413de869f27bc20e376f6ab1e05147be383506fba68af495a543761bec428405af74a648775d592cdde49ae552676018d64a2f512b31bb7e9440dcf6ecd723b9ce783ff2335ff8790e075fea95", 0x6d, 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) shutdown(r0, 0x1000000000001) 16:50:53 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) 16:50:53 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000140)={0x0, 0x227, &(0x7f00000000c0)={0x0, 0xfffffd01}}, 0x0) 16:50:53 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000280), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r1, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000900}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r2 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r2, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x278, r3, 0x310, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffe0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc8c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2f8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x54, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffffffffffffb, @local, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bond_slave_0\x00'}}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffffffffffe}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3f}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd000000000000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x278}, 0x1, 0x0, 0x0, 0x800}, 0x1) 16:50:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x500000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000007fdc00"}, 0x1c) 16:50:53 executing program 1: clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1044, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000280)='./file0\x00', 0x0) capget(&(0x7f0000000000), 0x0) ptrace(0x11, r0) 16:50:53 executing program 4: gettid() r0 = memfd_create(&(0x7f0000000040)='\x00\xfe\xa5\xbe\xee\x11\x83\xa9\xf8\xce\xa7\xbdx\x06\xf5\xa0\x04\x8c\t\x87\x97|\vZ1\xb6|\xa8\xd36\x10\xf0\x98\x965\xa1\x80|?\x10\x80\xae\x11\x13\xc6\xcf\xb9q.\xfd\xef\x95\xddlWGs\xf7`\x02\xfd\x17\xb6\x9b\xf2~2I\xa1\xcf\t\xa1`X\xa5^\x17\x9d\xcbxT\x84\xee\x1d\xdf\x97B\x89q\xd5\xc3\x92\b\xb9\xa7\'', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, &(0x7f0000000280)) fstat(r0, &(0x7f00000002c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, &(0x7f00000006c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) openat$audio(0xffffffffffffff9c, 0x0, 0x400000, 0x0) lstat(&(0x7f0000000980)='./file0\x00', 0x0) stat(0x0, 0x0) stat(0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB], 0x1, 0x0) 16:50:54 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) 16:50:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x600000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000003e800"}, 0x1c) 16:50:54 executing program 1: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x212, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f00000000c0)) close(r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 16:50:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x1e000000}) 16:50:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x12001000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, r1, 0x200, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x1, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4040}, 0x4000000) 16:50:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000fffffdef00"}, 0x1c) 16:50:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x700000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:54 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x204e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000001, &(0x7f0000000180)={0x2, 0x10084e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0x487, 0x1000000}, 0x1500) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) 16:50:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000001f400"}, 0x1c) 16:50:54 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x1f00000000000000, 0x0, 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x7, 0x0, 0x0) ioctl(r1, 0x1400008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000ac0)=@nat={'nat\x00', 0x19, 0x4, 0x90, [0x200004c0, 0x0, 0x0, 0x200004f0, 0x20000520], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x2}]}, 0x108) 16:50:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xfffffcbe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x2f, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 16:50:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x800000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xffbc) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x25}}, 0x34) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss, @mss, @window, @sack_perm], 0x1bf) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendto(r0, &(0x7f00000000c0)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240), 0x20e) close(r0) 16:50:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000fffffff500"}, 0x1c) 16:50:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000080)={0x1, 0xfffffffffffffc00}) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:54 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) 16:50:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000fc00"}, 0x1c) 16:50:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x900000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x100000011, @initdev, 0x0, 0x0, 'lblc\x00'}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1400008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 16:50:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x41, &(0x7f0000000040)={0x0, 0x0}, 0x8) 16:50:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000180), 0x0, 0x1}, 0x20) 16:50:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x7}, {0x20000000000006}]}, 0x10) 16:50:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000080fe00"}, 0x1c) 16:50:55 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgid(0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x400, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0x3fffffffc, 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:55 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x400000004, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x2]}, 0x40d) 16:50:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f00000000c0), 0x0, 0x2}, 0x20) 16:50:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xa00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000c0fe00"}, 0x1c) 16:50:55 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x80000001, 0x807c, 0x6, 0x0, 0x2, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) 16:50:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1000000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:55 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f00000002c0)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23, 0x651b80dd458fd213) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "fe256484ed1a5d9b74fed0674d1449a55015ad6087aeb3a06338def4de0d4c7670b8c9d52d62e8e16bfa25b231627a056f013bf4442b74ed999a5e5e33ed004ca38e97887ab7a348313f83d3bb149278310598587581c57d0503583a470f7a857388195116efd471793576f6857176dcd98e2d8b168d9c5265089e048f15f993b9fc24b7ea85f9701891287fd3a390ef5795372c2ae73e274601f35c86d70469f890c77740e9b4354d05c90a69e113ffd4b06900d5907919f696184be6077e6e52c8658db4"}, 0xc9) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101000, 0x0) 16:50:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000a82ff0fe00"}, 0x1c) 16:50:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x84}, {0x20000000000006}]}, 0x10) 16:50:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:50:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x1f00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000ff00"}, 0x1c) 16:50:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)="55484928d05de72eb8caf05bfa15529193c34db9ed99f182e5f9f2d72d274adb9da913b52595a4e74cb158fd873c2f121223c6ecff849d121448579c938f8f3c6eff5301d3a06d1a2290f37f05276a242c7452e7df20fa8021b08e0d36b28d59cea79a1669f25cb255d84a66e106bf955a36361565e182c7a65572339187717f1ec9658efae2bf79fb597164d802393edfac8e8904fdd272e95df3", 0x9b}, {&(0x7f0000000100)="ac7742cbd2920b3394026fa149a2ace06db8563095049a7415276b7b0547883e4c1ace2c", 0x24}], 0x2, 0x2) 16:50:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:50:56 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000100)=[{0x2}, {0x20000000000006}]}, 0x10) 16:50:56 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 2: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:50:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='gid_map\x00') sendfile(r0, r0, 0x0, 0x3ff) 16:50:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000fff00"}, 0x1c) 16:50:56 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x0, 0x807c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 16:50:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:56 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 0: r0 = socket(0x10, 0x803, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000080)=0x1, 0x2, 0x0) mremap(&(0x7f00007bb000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f00008fc000/0x1000)=nil) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xd0, 0x800) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000100)=0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x80}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r2, 0xa178}, 0x8) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x101000) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2010000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000ffffffff00"}, 0x1c) 16:50:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:56 executing program 4: 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x230f000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:57 executing program 4: 16:50:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sync() 16:50:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000200"}, 0x1c) 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 4: 16:50:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x0, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3a20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:57 executing program 4: 16:50:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:57 executing program 4: 16:50:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000300"}, 0x1c) 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x0, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x24) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x400000000000000, 0xffff, 0x2a59, 0xf2, 0x1}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0xf6, "d56c6f7c4f8c6a3fd646c4b8eddbe33bdd5ffdb56ba159b2fe8a40f1179e5d4a8c693182df6443187620a3bc0eb912ea7ae130b428cde9a9c60932cd8aa830f90b4be178932a49b15106181f7fc0fda294df987f15d5c0160ef829b35f14fbcfff60d8400c68542afe2301aca56086c3e56692d67966e532801f8990bc7f6fb70c3f615320a6701d70d02508943d8f1bde079c35452eff71115291a888a0a0cd5631a74559b682b87eb36e3d3044f252c5d83d15de7247605e9b0e5d8be25d8290944e8bc2c462c8c066c427bf7411c886d59d4917962714b7fb2a570a0145e5715f39a2515c643749ceb85d76a3d96cb75cc2fe4db6"}, &(0x7f0000000100)=0xfe) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="12000000127b00000000000000a1", 0xe, 0x0, 0x0, 0x0) 16:50:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:57 executing program 4: 16:50:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3b20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x0, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000400"}, 0x1c) 16:50:57 executing program 4: 16:50:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x0, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:57 executing program 4: 16:50:57 executing program 0: r0 = dup(0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r1, 0xbc, "911e84", "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"}}, 0x110) r2 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r2, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000500"}, 0x1c) 16:50:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3c20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:58 executing program 4: 16:50:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:58 executing program 4: 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x0, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000600"}, 0x1c) 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x0, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}, 0x40, 0x0, 0x0, 0x0, 0x200, &(0x7f0000000040)='ip6gretap0\x00', 0x5, 0xb93b, 0x800}) 16:50:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3d20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:58 executing program 4: 16:50:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x0, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x0, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 4: 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x0, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:50:58 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x0, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:58 executing program 4: 16:50:58 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x0, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3e20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000001c0), &(0x7f0000000100)=0x68) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0xfffffffffffffdbd) 16:50:59 executing program 4: 16:50:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:50:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3f00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:59 executing program 4: 16:50:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:59 executing program 4: 16:50:59 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:50:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:50:59 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x200000) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000080)={0x1f, 0x40000bfd, &(0x7f00000001c0)="5146f82d4ef1f7674f531bf03b52ea25fed3b4db52db4ec36894ac734b594f5690c1e31a37e6f71835f9e41bce0836da1f8bb7121caf2a9f29520601ae367a0df3d16366c09da7f63a5b955796d7ee5d942d663d2b331333e892a0cca548e0b69bcbfd09e7813ddfb1ebed79d993d2ed7a4a677784f514bf9d9785f6c1ca26d2801408bea5a23bbafa2387c77605a2c2467356bf73436fdfe1441997ef4840ea3cc35f55cca5fa5ccc", &(0x7f0000000280)="d34ec7313c6256138b9a2e636cf9077f581d11aa666587d32b5df874b21f7119842fffadc2a6fda4ac668a5c1d13616980f9359f7491bb23bf815a7d3643a90bbac87892e891e18230ad466f3889b27d2d318ab735cf765e672f55939dda502b869a3959537ab7be01991ea16239200f25ec4e22aab513ff67cefe9a4856b1e9ad428a14aec8ff4bb13766777b9e661eb7e6103c14189349c0174f1a9bd4e8796ef700fd1fba8d7fe4c107c8920b0e57843c660a05301dee6c482b896f8bb9f187be4986bbae67aebbd1b6c5b27b284c281311904f5abfd1496e9caf", 0xa9, 0xdc}) 16:50:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:50:59 executing program 4: 16:50:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 16:50:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x3f20010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, 0x0, 0x0) 16:50:59 executing program 4: 16:50:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 16:50:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, 0x0, 0x0) 16:50:59 executing program 4: 16:50:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4000000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:50:59 executing program 0: r0 = socket(0x10, 0x803, 0xfffffffffffffe00) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f0000000500)={0x3, &(0x7f00000004c0)=[{}, {}, {}]}) sendmsg$tipc(r0, &(0x7f0000000480)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e22, 0x1}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="3ab831d34262700d977b152fd1924a1beda4be832b2755ada8d7edd38f9f9502742f87c4b9", 0x25}, {&(0x7f00000001c0)="2bc12f1657684bb6c1f94b51c30886857c935ad73e98a93b8353186902766562b533cc6d5b1a9c6219f76e3677a6f75359cfb425ffe5995d0e7b116b84beca04490453e31b834ee1", 0x48}, {&(0x7f0000000240)="58678a7785583afeb233f3232d1fd1e4467a533bb834c287756a981f4ae74665f9b97c9ae0d5335e0ca60eed00fc0cb21415114e72721b7c7a433495a27e9780a1524417e8dc71db28571bad", 0x4c}, {&(0x7f00000002c0)="6e6264ddba0b6fc9ba0c931d1cff054ad614da489fc99f95b2e9ebbf9797f6555fed311c066ddc81730dc6024eed86b4bb97be78d474582d2e21d192860d43d8184dcf7afe2d7a312317b1cc5f13ca8299e76f0e5f7af418b9f4e1bd80c3f48076acfd768ecd329eecad7026258bc33e555a45ce0587eecefde9117bf0132cc69b0d98365e45f9bf023ab883b1412acc9303a5c6d6ba2e5b2e2839c8cb793568be9f73d9fc0bdef3fe", 0xa9}], 0x4, &(0x7f0000000380)="19b62c8cbbd2e9469d2fa7fdc8963bf568665919f91b0e881b31bfc45ad047558dad190684ba0c0e5e78b51d05acae422b04afbef8e24b5d1d118279cd452fc06b2e2e966949e488acd9a2700f181d84c02819d1daf5ccfbd6e9768f7d8a903bbd2036f7900c19f0b9733dc85555e9cf05ac47d5ebc2a347eb7ad6fb29648a25b64edd659b014aaf502df3d18ea99aeac75c7eb4b9b6780654591a35f6b3dca0de91803e2253ff97ec9ac35dad873d85509a89cc20a21e760e35c6cf7fa75de6cdeb079207fb58356016a03a9bf55cfea3cc4d09fccb5366950f186534dbc727f13d1d01e8a588865d56dc88", 0xec, 0x40014}, 0x48000) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:50:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) 16:50:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, 0x0, 0x0) 16:50:59 executing program 4: 16:50:59 executing program 4: 16:50:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000e00"}, 0x1c) 16:50:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4020010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:50:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:50:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:51:00 executing program 4: 16:51:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:51:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:51:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8781f49105bff14ea6d20002b1f00c0e9ff09d83c9d7101", 0x19) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x31) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000001000"}, 0x1c) 16:51:00 executing program 4: 16:51:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:51:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:51:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4120010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:00 executing program 4: 16:51:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x18) 16:51:00 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f0000000340)='\x1a\xa86\x8a\x9b\xf8]\xc5\x06c\x9a\x11e!\xad?\x9ate\xe9\xf2c\xceZ%\x9a\x00\xcb\bY\x8f\x9e\xcb\x9a \xe0\x7f^\x03c\xd8\x8f\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\r<\xfc\xf11\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\v\x868%l0\xa1%\xb3\x1b,g\x8d\xfa\x8dq&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4NW=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\xb1\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5$\xe3\x1f7T\xe7\xd6A\x8b\x11Qx\xa0\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl') 16:51:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000380)=0x4001ff) sendto$inet(r0, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) 16:51:00 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) 16:51:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4220010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:51:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x18) [ 786.242107][ T3802] ecryptfs_parse_options: eCryptfs: unrecognized option [¨6Š›ø]Åcše!­?šteéòcÎZ%š] [ 786.283977][ T3802] ecryptfs_parse_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README 16:51:00 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x18) [ 786.373101][ T3802] Error parsing options; rc = [-22] 16:51:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 16:51:00 executing program 2: clone(0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000100)='./file1\x00', &(0x7f0000000000)='./file1\x00') 16:51:00 executing program 1: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) wait4(0x0, 0x0, 0x0, 0x0) 16:51:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4320010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) r0 = gettid() r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xc0109207, 0x20000000) read(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x2000000000000015) 16:51:01 executing program 2: 16:51:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/65) 16:51:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4420010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:01 executing program 4: 16:51:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fc00"}, 0x1c) 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000f40100"}, 0x1c) 16:51:01 executing program 1: 16:51:01 executing program 4: 16:51:01 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4520010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:01 executing program 2: 16:51:01 executing program 4: 16:51:01 executing program 1: 16:51:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000180200"}, 0x1c) 16:51:01 executing program 1: 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:01 executing program 1: 16:51:01 executing program 4: 16:51:01 executing program 2: 16:51:02 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000001c0)="120075d21200e7ef037b8c1261d8ea88e4c73936c762d56ac9556bd163a3b6018e79f43a085912736e93420fe4c48fc886f0386dbd3b47d83995a0e9605595b943cf7a38b4ddb3be9e9e983614bd2220415d48cfd021f51d7dfdbf431360e88dc3b1c64f86a4bbada573c927ced0da9c20bf6c6641ebc246c4e112590f9be57dabebdd3a717cf8", 0xffffffffffffff09, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x32) 16:51:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4620010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:02 executing program 2: 16:51:02 executing program 1: 16:51:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000400200"}, 0x1c) 16:51:02 executing program 4: 16:51:02 executing program 2: 16:51:02 executing program 1: 16:51:02 executing program 4: 16:51:02 executing program 2: 16:51:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4720010000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000300"}, 0x1c) 16:51:02 executing program 4: 16:51:02 executing program 1: 16:51:02 executing program 2: 16:51:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000e80300"}, 0x1c) 16:51:02 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000080)=0x1) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4800000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:02 executing program 4: 16:51:02 executing program 2: 16:51:02 executing program 1: 16:51:02 executing program 4: 16:51:02 executing program 2: 16:51:02 executing program 1: 16:51:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000500"}, 0x1c) 16:51:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x4c00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:02 executing program 4: 16:51:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000600"}, 0x1c) 16:51:03 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x70a000) 16:51:03 executing program 1: 16:51:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0}) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmmsg(r1, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000001780)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff090a51f101d6209318633478c39c6e217a6b01c7033500b0", 0x1fa) getpeername$tipc(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r2 = syz_open_dev$mouse(&(0x7f00000012c0)='/dev/input/mouse#\x00', 0x9, 0x408000) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000001300)) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000001700), 0x8) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000001200)={r0, r0, 0x1000, 0x1000, &(0x7f0000000200)="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", 0x0, 0x4, 0x4, 0x80000001, 0x5, 0x1, 0x5, 'syz0\x00'}) fsetxattr$security_evm(r2, &(0x7f0000000000)='security.evm\x00', &(0x7f0000001740)=@v2={0x0, 0x3, 0x14, 0x10000, 0x2f, "651805b1015e83525260e61951e60fdd3ca2e3a3427925f6675e3e38bb87a8f4ba362f36ebd17b8962e4695b156836"}, 0x39, 0x1) 16:51:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6800000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:51:03 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}], 0x1, 0x0) ioctl(r0, 0x40044103, &(0x7f0000000000)) 16:51:03 executing program 2: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 16:51:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:51:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x6c00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:03 executing program 1: 16:51:03 executing program 1: 16:51:03 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)) 16:51:03 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffff9c) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x8, 0x100000001, 0x6, 0x7fff, 0x0, 0x7fff, 0x51400, 0xe, 0x7, 0x100000001, 0x9, 0x2, 0x4, 0x8, 0x2, 0x2, 0x1, 0x7, 0xfffffffffffffff8, 0x3, 0x9, 0x100000000, 0x6, 0x7ff, 0x6f0f, 0x0, 0x4, 0x7, 0x1, 0x5, 0x3f, 0x8001, 0x9, 0x0, 0x3, 0x3, 0x0, 0x3, 0x3, @perf_config_ext={0x8000, 0xfffffffffffff801}, 0x40, 0x0, 0x7, 0x1, 0x1, 0x1, 0x8}, r1, 0x6, r1, 0x7) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000040)={0x7f, 0x8, 0x9, 0x10000, 0x80000000, 0xfffffffffffffff8}) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:04 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000080)={0x28}, 0x28) 16:51:04 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4000fff, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000000c0)={0x4}) 16:51:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:51:04 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7400000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:04 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, 0x0) 16:51:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) accept(r0, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000100)=0x80) 16:51:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 16:51:04 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000880)=[{r0}], 0x1, &(0x7f0000000900), 0x0, 0x0) 16:51:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2900000006000000000000000000000001000000000000000000000000000000000000b92700000000"], 0x29) 16:51:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000e00"}, 0x1c) 16:51:04 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x2, 0x0) ppoll(&(0x7f0000000880)=[{r0}], 0x1, &(0x7f0000000900), 0x0, 0x0) 16:51:04 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x7a00000000000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:04 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev\x00') dup2(r2, r1) 16:51:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 16:51:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chmod(&(0x7f0000000240)='./file0\x00', 0x0) 16:51:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000021800"}, 0x1c) 16:51:04 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x8cffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:04 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000080)=r1) 16:51:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) 16:51:04 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=@random={'system.', 'fuse\x00'}, &(0x7f0000000200)=""/33, 0x21) 16:51:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:51:04 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x97ffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000380), 0xfffffffe) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) mkdir(0x0, 0x0) 16:51:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:51:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x400, 0x0) r2 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x8, 0x10000) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f00000001c0)={0xb, 0x80, 0x4, 0x4800, r2}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x9, 0x8000}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xe4ffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:51:05 executing program 1: syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') 16:51:05 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) getpgid(0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/dev\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 16:51:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf5ffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x100000000008, &(0x7f0000d9bffc), 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000040)={0x81, 0x401, 0xfffffffffffffe01}, 0xc) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x0, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'lo\x00'}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) mkdir(0x0, 0x0) 16:51:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:51:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf6ffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x11, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0xffffffe3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(0xffffffffffffffff, 0xc0206416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x14}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2b, 'io'}, {0x0, 'memory'}]}, 0xc) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000480)={'lo\x00'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000237, 0x0) mkdir(0x0, 0x0) 16:51:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='reno\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f0000000240)) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') 16:51:05 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) 16:51:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000024000"}, 0x1c) 16:51:05 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000bb9000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000172000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000229000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) mmap(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x0, 0x80000000000032, 0xffffffffffffffff, 0x0) 16:51:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xf9fdffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:06 executing program 2: perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) 16:51:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x3, 0x4) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) 16:51:06 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000000c0)={0x1, 0x0, 0x0}) write$evdev(r0, &(0x7f0000000080)=[{}], 0x18) sendfile(r1, r0, &(0x7f0000000000), 0x100000001) 16:51:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:06 executing program 0: r0 = socket(0xd, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000100)={0x9, 0x5, 0x3, 0xffffffff00000000}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x9, 0x0, 0x200, 0x800}, 0x10) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8a00}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x31f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) 16:51:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfdffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:06 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffff3fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x4a, &(0x7f0000534000), &(0x7f0000000080)=0xfdda) 16:51:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) get_mempolicy(0x0, &(0x7f0000000180), 0xfffffffffffffff7, &(0x7f0000002000/0x2000)=nil, 0x4) 16:51:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000dc7f00"}, 0x1c) 16:51:06 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000c, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x848000000015, 0x805, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, &(0x7f0000000000)) 16:51:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfeffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:06 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 16:51:06 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x58, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:tape_device_t:s0\x00', 0x23, 0x1) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0x0, 0x8, {0x1}}, 0x18) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:06 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r0, 0x0) 16:51:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffff7f00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fe8000"}, 0x1c) 16:51:06 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r0, 0x0) 16:51:06 executing program 4: r0 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x81000008912, &(0x7f0000000080)="0adc1f123c40a41d88b070") ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="052fc73cffffffff418844d03d7cb1ce60f62ca3ede1090000005ecbc67087ad659353445f200000009dfba56e9136a3d0d056b00040ef7324"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) 16:51:06 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) clock_gettime(0x0, &(0x7f0000000040)) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffea4) 16:51:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000ffb800"}, 0x1c) 16:51:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffffff00000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:07 executing program 4: 16:51:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x0, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff81, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:07 executing program 2: 16:51:07 executing program 1: 16:51:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xffffffff87600000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:07 executing program 4: 16:51:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fec000"}, 0x1c) 16:51:07 executing program 2: 16:51:07 executing program 1: 16:51:07 executing program 2: 16:51:07 executing program 4: 16:51:07 executing program 1: 16:51:07 executing program 2: 16:51:07 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) r2 = dup(r0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000200)={0x1}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r2, 0x2, 0x1}, 0x10) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f0000000040)='net/ip6_tables_names\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f00000001c0)={'tunl0\x00', {0x2, 0x4e23, @multicast1}}) 16:51:07 executing program 4: 16:51:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xfffffffffffff000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000007fdc00"}, 0x1c) 16:51:07 executing program 1: 16:51:07 executing program 2: 16:51:07 executing program 4: 16:51:07 executing program 2: 16:51:07 executing program 4: 16:51:07 executing program 1: 16:51:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'%d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:08 executing program 4: 16:51:08 executing program 1: 16:51:08 executing program 2: 16:51:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000003e800"}, 0x1c) 16:51:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x80000) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:08 executing program 4: 16:51:08 executing program 2: 16:51:08 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'.d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:08 executing program 1: 16:51:08 executing program 4: 16:51:08 executing program 1: 16:51:08 executing program 2: 16:51:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000001f400"}, 0x1c) 16:51:08 executing program 4: 16:51:08 executing program 1: 16:51:08 executing program 2: 16:51:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x420000, 0x0) 16:51:08 executing program 4: 16:51:08 executing program 1: 16:51:08 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'/d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:08 executing program 2: 16:51:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fc00"}, 0x1c) 16:51:08 executing program 4: 16:51:08 executing program 2: 16:51:08 executing program 1: 16:51:08 executing program 4: 16:51:08 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'\xc0d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:08 executing program 1: 16:51:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000001c0)="2600000022000007008980e839de790a1706006d2000131f00c0e9ff094a51f1033500b029f0418ea8e1c873fd00c966049bd6f0ad40f083ae80cf555828609d2da467d34067d95a857ede20fd624a47a5ffcc6de46149464e12c15d0a0946304522a0cac25092d855252c979af3c4c5e98e7f3390cb905a11c990baf46f1f159b653dfb444dc8d6b07b72a7d02ce91d4a84baf0e405bad13ebef490bb72de435e0c0d46667caaf0d0caed39fec3c0b9", 0xb0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x20, 0x100000000, 0x200, 0x8001, 0x7, 0x2, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14, 0x80800) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0xfffffef4, 0xfffffffffffffffe, 0x0, 0x0) 16:51:09 executing program 2: 16:51:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000080fe00"}, 0x1c) 16:51:09 executing program 1: 16:51:09 executing program 4: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fD', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:09 executing program 1: 16:51:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000c0fe00"}, 0x1c) 16:51:09 executing program 2: 16:51:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:09 executing program 4: 16:51:09 executing program 1: 16:51:09 executing program 2: 16:51:09 executing program 4: 16:51:09 executing program 1: 16:51:09 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'f\x90', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:09 executing program 2: 16:51:09 executing program 4: 16:51:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000ff00"}, 0x1c) 16:51:09 executing program 1: 16:51:09 executing program 2: 16:51:09 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000cc0)={0x6, 0x39c, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) read$FUSE(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'bcsf0\x00', @ifru_settings={0x1, 0x86b, @fr_pvc_info=&(0x7f0000000040)={0x10000, 'veth0_to_hsr\x00'}}}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:09 executing program 1: 16:51:09 executing program 4: 16:51:09 executing program 2: 16:51:09 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x25, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000fff00"}, 0x1c) 16:51:10 executing program 4: 16:51:10 executing program 2: 16:51:10 executing program 1: 16:51:10 executing program 2: 16:51:10 executing program 4: 16:51:10 executing program 1: 16:51:10 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x7, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:10 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x25, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:10 executing program 2: 16:51:10 executing program 4: 16:51:10 executing program 1: 16:51:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000b8ff00"}, 0x1c) 16:51:10 executing program 1: 16:51:10 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0x4004743b, 0x0) 16:51:10 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) readv(r0, 0x0, 0x0) 16:51:10 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'%ootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300020c00000000000000000000000200080008000000e500000000000000030006000000000002000000e000000100ecffffff000000020001000000000000000200006d0000030005000000000002000000e00000010000000000000000"], 0x60}}, 0x0) 16:51:10 executing program 0: r0 = dup(0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000200"}, 0x1c) 16:51:11 executing program 4: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000140)='./file0\x00') syz_genetlink_get_family_id$ipvs(0x0) lchown(&(0x7f0000000080)='./file0/../file0/file0\x00', 0x0, 0x0) umount2(&(0x7f00000005c0)='./file0/../file0/file0\x00', 0x80000000002) 16:51:11 executing program 1: timer_create(0x2, 0x0, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, 0x0, &(0x7f0000000140)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_gettime(0x0, &(0x7f0000000340)) 16:51:11 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x2, "a77760f5a7645bc43c241d69912dda0c6300a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4bec2d8a09c41fb2332c5f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) socketpair$unix(0x1, 0x400000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 16:51:11 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'r%otmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000500"}, 0x1c) 16:51:11 executing program 4: 16:51:11 executing program 2: 16:51:11 executing program 4: 16:51:11 executing program 1: 16:51:11 executing program 2: 16:51:11 executing program 0: r0 = socket(0x10, 0x803, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x800) 16:51:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000100"}, 0x1c) 16:51:11 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rdotmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:11 executing program 4: 16:51:11 executing program 1: 16:51:11 executing program 1: 16:51:11 executing program 2: 16:51:11 executing program 4: 16:51:11 executing program 2: 16:51:11 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000200"}, 0x1c) 16:51:11 executing program 1: 16:51:11 executing program 4: 16:51:12 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xfff, 0x202000) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=@dstopts={0x3f, 0x2, [], [@enc_lim={0x4, 0x1, 0x6}, @jumbo={0xc2, 0x4, 0x3f}, @pad1, @jumbo={0xc2, 0x4, 0x7}]}, 0x20) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:12 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rsotmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:12 executing program 1: 16:51:12 executing program 2: 16:51:12 executing program 4: 16:51:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000300"}, 0x1c) 16:51:12 executing program 1: 16:51:12 executing program 2: 16:51:12 executing program 4: 16:51:12 executing program 4: 16:51:12 executing program 2: 16:51:12 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'ruotmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:12 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000000a004e200000000200000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000090000000a004e2100000008fe8000000000000000000000000000aa04000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e220000003ffe80000000000000000000000000000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000007fe80000000000000000000000000002306000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e240000000071ec50d5287817ac07a595cb4c1963430500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b69b4a0400000000000000000000000000000000000000000000000a004e2000000000fe88000000000000000000000000010101000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e20fffffffe4fe36ccbbb92e0724bc2d0f5711375b406000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000101ff02000000000000000000000000000107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e21000000024f48fd6f1a55fb9c01792bbbf5e0f2423f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000fff00000000000000000000ffffe00000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x510) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:12 executing program 1: 16:51:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000400"}, 0x1c) 16:51:12 executing program 2: 16:51:12 executing program 4: 16:51:12 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rxotmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:12 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000740)={0x0, {{0x2, 0x0, @initdev}}, {{0x2, 0x0, @initdev}}}, 0x108) 16:51:12 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(r0, r3) tkill(r2, 0x1000000000016) 16:51:12 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 16:51:12 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'ro%tmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:12 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x0) 16:51:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000500"}, 0x1c) 16:51:13 executing program 0: r0 = socket$pptp(0x18, 0x1, 0x2) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') sendfile(r0, r0, 0x0, 0x5) 16:51:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x4, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000240)) 16:51:13 executing program 4: 16:51:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rodtmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000600"}, 0x1c) 16:51:13 executing program 4: 16:51:13 executing program 1: 16:51:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x6d) r1 = accept4(r0, 0x0, 0x0, 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) ioctl(0xffffffffffffffff, 0x0, 0x0) 16:51:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 16:51:13 executing program 2: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2, &(0x7f0000000180), 0x13b) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="b7", 0x1}], 0x1}, 0x0) 16:51:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:51:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rostmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10100}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x2, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x1, 0x550, 0x4, 0x7fffffff}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r2, 0x2, 0x70bd29, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) 16:51:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'routmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:51:13 executing program 2: 16:51:13 executing program 1: 16:51:13 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) io_setup(0xff, &(0x7f0000000040)=0x0) r3 = fcntl$dupfd(r0, 0x406, r0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x1ff, r0, &(0x7f0000000080)='[l', 0x2, 0x5, 0x0, 0x1, r3}, &(0x7f00000001c0)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) accept$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:13 executing program 4: 16:51:13 executing program 2: 16:51:13 executing program 1: 16:51:13 executing program 4: 16:51:13 executing program 2: 16:51:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'roxtmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:13 executing program 1: 16:51:13 executing program 4: 16:51:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:51:13 executing program 2: 16:51:14 executing program 1: 16:51:14 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x402, 0x0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) 16:51:14 executing program 4: 16:51:14 executing program 2: 16:51:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'roo%mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:51:14 executing program 1: 16:51:14 executing program 4: 16:51:14 executing program 2: 16:51:14 executing program 1: 16:51:14 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x77d9, 0x40) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={r1}) r2 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x40) sendto(r2, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'roo/mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:14 executing program 2: 16:51:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000e00"}, 0x1c) 16:51:14 executing program 4: 16:51:14 executing program 1: 16:51:14 executing program 2: 16:51:14 executing program 4: 16:51:14 executing program 1: 16:51:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000001000"}, 0x1c) 16:51:14 executing program 4: 16:51:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'roo4mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:14 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2000, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x212, r0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x1ffe00000000000, 0x100, 0x200}) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x20000081) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f00000005c0)={0xa0, 0x0, 0x5, {{0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x80000001, 0x807c, 0x6, 0x0, 0x0, 0x0, 0x0, 0xcb1}}}}, 0xa0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r1) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 16:51:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x152, 0x400) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000100)=0x400000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000000c0)=0x5) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b00000000000000a1e0419dfc6ab92a8f108ebbdd7c25ef49e15c6fe8b493ab4d59d2de1d26090f9604d7d12a5382c7", 0x8c, 0x0, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000240)={@isdn={0x22, 0x8, 0xe3, 0x4, 0x8}, {&(0x7f00000001c0)=""/57, 0x39}, &(0x7f0000000200), 0xc}, 0xa0) 16:51:15 executing program 4: read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200}) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(r0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) 16:51:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000021800"}, 0x1c) 16:51:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'roo\xa4mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 1: openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 16:51:15 executing program 4: fsync(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, 0x0) 16:51:15 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) mkdir(0x0, 0xfffffffffffffffe) r1 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0xbd1b) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r5, 0x8, 0x70bd27, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000000) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 16:51:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000009681ec1c00"}, 0x1c) 16:51:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'root%ode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) io_setup(0xff, &(0x7f0000000040)=0x0) r3 = fcntl$dupfd(r0, 0x406, r0) io_cancel(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x1ff, r0, &(0x7f0000000080)='[l', 0x2, 0x5, 0x0, 0x1, r3}, &(0x7f00000001c0)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) accept$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e) ioctl$TUNDETACHFILTER(r3, 0x401054d6, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:15 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'ruotmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x3, 0x242000) ioctl$UI_DEV_DESTROY(r1, 0x5502) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) 16:51:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:51:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootm%de', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 4: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000cc0)={0x6, 0x39c, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) read$FUSE(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'bcsf0\x00', @ifru_settings={0x1, 0x86b, @fr_pvc_info=&(0x7f0000000040)={0x10000, 'veth0_to_hsr\x00'}}}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:15 executing program 1: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000cc0)={0x6, 0x39c, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) read$FUSE(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'bcsf0\x00', @ifru_settings={0x1, 0x86b, @fr_pvc_info=&(0x7f0000000040)={0x10000, 'veth0_to_hsr\x00'}}}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:15 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x25, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sync() 16:51:15 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmdde', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:51:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000fffffdef00"}, 0x1c) 16:51:15 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:15 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sync() 16:51:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000cc0)={0x6, 0x39c, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) read$FUSE(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'bcsf0\x00', @ifru_settings={0x1, 0x86b, @fr_pvc_info=&(0x7f0000000040)={0x10000, 'veth0_to_hsr\x00'}}}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:16 executing program 4: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x6) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000340)={0x2, 0x1587a3b1, 0x7}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000280)) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) setuid(r2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/keycreate\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x51, 0x4) 16:51:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:51:16 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmsde', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r0, r1}) 16:51:16 executing program 1: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000cc0)={0x6, 0x39c, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) read$FUSE(r1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f0000000080)={'bcsf0\x00', @ifru_settings={0x1, 0x86b, @fr_pvc_info=&(0x7f0000000040)={0x10000, 'veth0_to_hsr\x00'}}}}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:51:16 executing program 4: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\x00') r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x6) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000340)={0x2, 0x1587a3b1, 0x7}) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000280)) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) setuid(r2) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/keycreate\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x51, 0x4) 16:51:16 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000400)='/dev/admmidi#\x00', 0x4, 0x200) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000002c0)) r1 = socket(0x10, 0x803, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f00000003c0)={0x82, &(0x7f0000000300)=""/130}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f00000004c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9e}, r2}}, 0x30) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000280), 0x4) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e23, 0x9, @rand_addr="2d4a389cfe9a6532a4689ecc24585a8e", 0x5}}}, &(0x7f0000000100)=0x84) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r0, r1}) 16:51:16 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmude', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='setgroups\x00') write$FUSE_POLL(r0, &(0x7f0000000440)={0x18, 0x0, 0x6, {0x3}}, 0x18) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000000)="05", 0x1) dup2(r3, r4) ioctl$TCFLSH(r3, 0x540b, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x2) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="c86470830ffff3ee323145ac2e56f25abc5e9971", 0x14}], 0x1) getsockname(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) exit_group(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000240)={0x100000000, 0x3, {0x0, 0x1, 0x7fffffff, 0x1, 0x7}}) recvfrom(r5, &(0x7f0000000380)=""/77, 0x4d, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x4, {{0xa, 0x4e23, 0x80000001, @empty, 0x6}}}, 0x88) 16:51:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='setgroups\x00') write$FUSE_POLL(r0, &(0x7f0000000440)={0x18, 0x0, 0x6, {0x3}}, 0x18) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000000)="05", 0x1) dup2(r3, r4) ioctl$TCFLSH(r3, 0x540b, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x2) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="c86470830ffff3ee323145ac2e56f25abc5e9971", 0x14}], 0x1) getsockname(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) exit_group(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000240)={0x100000000, 0x3, {0x0, 0x1, 0x7fffffff, 0x1, 0x7}}) recvfrom(r5, &(0x7f0000000380)=""/77, 0x4d, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x4, {{0xa, 0x4e23, 0x80000001, @empty, 0x6}}}, 0x88) 16:51:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000024000"}, 0x1c) 16:51:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r0, r1}) 16:51:16 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmxde', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='setgroups\x00') write$FUSE_POLL(r0, &(0x7f0000000440)={0x18, 0x0, 0x6, {0x3}}, 0x18) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000000)="05", 0x1) dup2(r3, r4) ioctl$TCFLSH(r3, 0x540b, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x2) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="c86470830ffff3ee323145ac2e56f25abc5e9971", 0x14}], 0x1) getsockname(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) exit_group(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000240)={0x100000000, 0x3, {0x0, 0x1, 0x7fffffff, 0x1, 0x7}}) recvfrom(r5, &(0x7f0000000380)=""/77, 0x4d, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x4, {{0xa, 0x4e23, 0x80000001, @empty, 0x6}}}, 0x88) 16:51:16 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:16 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x40000) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'veth1_to_bond\x00', 0xf4f}) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0xc0ed0000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmoDe', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000400)='setgroups\x00') write$FUSE_POLL(r0, &(0x7f0000000440)={0x18, 0x0, 0x6, {0x3}}, 0x18) r1 = socket(0x10, 0x803, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x20201) fcntl$setstatus(r4, 0x4, 0x2800) ioctl$TCXONC(r4, 0x540a, 0x0) write(r4, &(0x7f0000000000)="05", 0x1) dup2(r3, r4) ioctl$TCFLSH(r3, 0x540b, 0x0) write(r1, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000100)=0x2) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000480)="c86470830ffff3ee323145ac2e56f25abc5e9971", 0x14}], 0x1) getsockname(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) exit_group(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000240)={0x100000000, 0x3, {0x0, 0x1, 0x7fffffff, 0x1, 0x7}}) recvfrom(r5, &(0x7f0000000380)=""/77, 0x4d, 0x100, 0x0, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x4, {{0xa, 0x4e23, 0x80000001, @empty, 0x6}}}, 0x88) 16:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x2000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000ffffff8d00"}, 0x1c) 16:51:17 executing program 1: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) 16:51:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmo\x90e', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 1: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:17 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8000, 0x1) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000080)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000100)={@ipv4={[], [], @broadcast}}, &(0x7f00000001c0)=0x14) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff0615ff9012d17df4c4affb1a5a00b92a69bb1f00c0e9ff094a51f10101c7033500b0", 0x31) prctl$PR_SET_TSC(0x1a, 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) times(&(0x7f00000002c0)) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000300)={@local}, &(0x7f0000000340)=0x14) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000200)=""/80, &(0x7f0000000280)=0x50) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:17 executing program 4: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0xe00000000000000, 0x0, 0x0) 16:51:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000ffffff9100"}, 0x1c) 16:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) 16:51:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmod%', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 4: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000001000"}, 0x1c) 16:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000300)="120000001200e7ef007b00000000000000a1d0dc5a62365bbd3cc2663c945f85ddc864250261e8980854eb04856f80f23a78191ae646e748d1672133dd086ef368b9344ece05f790722b3943c135c7", 0xff4f, 0x0, 0x0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) 16:51:17 executing program 1: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x1000000, 0x0, 0x0) 16:51:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000001cec819600"}, 0x1c) 16:51:17 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x25, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:17 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:17 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x4, 0x4) r1 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:17 executing program 1: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(&(0x7f0000000600)=""/102) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000740)) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendfile(r0, r0, 0x0, 0x2000005) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000380)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000b80)) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:18 executing program 4: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:18 executing program 1: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(&(0x7f0000000600)=""/102) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000740)) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendfile(r0, r0, 0x0, 0x2000005) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000380)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000b80)) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fef02fa800"}, 0x1c) 16:51:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x283, 0x2}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:18 executing program 4: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) sendfile(r0, r0, 0x0, 0x2000005) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:18 executing program 0: r0 = socket(0xc, 0xa, 0xfffffffffffffffe) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000240)="2600000000006cad46e402cf9e0000000007008980e8ff064a51f1", 0xfffffffffffffeae) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x8000) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000001380)={0x6, 0xc000000000000003}) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc)=0x3f, 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001300)='/dev/autofs\x00', 0x40000, 0x0) ioctl$VIDIOC_ENUMAUDIO(r3, 0xc0345641, &(0x7f0000000080)={0x6, "12aee973e538e22acd8d69db84c59f194521dfb3809b41152261489517b8e492", 0x2, 0x1}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xfff, 0x3370}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000280)={r4, 0x3, 0x1000, "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"}, 0x1008) setsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r4, 0x3}, 0x8) 16:51:18 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:18 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000003c0)=[{0x5, 0x0, [0x6, 0x7, 0x6, 0x6, 0x4, 0x7, 0x7fffffff, 0x1, 0x0, 0x0, 0x6, 0x4, 0xfffffffffffffe01, 0x8001, 0x2, 0x3fc]}, {0x1e, 0x0, [0x2, 0x3, 0x63, 0x10000, 0x41ae, 0xe517, 0x3, 0x7b, 0x5, 0x5, 0x101, 0x4, 0xffff, 0x7ff, 0x7, 0x800]}, {0x4, 0x0, [0x3, 0x1f, 0x2, 0xffff, 0xfffffffffffffffb, 0x1, 0xc2, 0x6, 0xfff, 0x6, 0x1, 0x6, 0xb34, 0x1000, 0x7fff, 0x2]}, {0x2, 0x0, [0x7ff, 0xd8, 0x7fff, 0x3, 0x1d0, 0x0, 0x7, 0x800, 0x9, 0x808, 0x9, 0x2, 0x80, 0xb86f, 0x1, 0x2]}, {0x20, 0x0, [0x0, 0x4, 0x8, 0x10000, 0x6551, 0x1, 0x80000000, 0x8, 0xda7, 0x401, 0x0, 0x5, 0x9, 0x86a, 0x9, 0x8001]}, {0x0, 0x0, [0xbf, 0x7, 0xf9, 0x9, 0x7fff, 0x3f, 0x0, 0x7, 0x4, 0x261, 0xdcc8, 0x3, 0xffffffffffffffff, 0x9, 0x5, 0xffffffff]}, {0x14, 0x0, [0x8, 0x1, 0x355, 0x5, 0x7ff, 0x4, 0x6, 0x6, 0x8, 0xfffffffffffffc01, 0xef, 0x6, 0xffff, 0x8, 0x10001, 0x36f]}, {0x30, 0x0, [0x100000001, 0x7, 0x101, 0xad, 0x6, 0x8, 0x4, 0x7, 0x7, 0x1, 0x10000, 0x1, 0x100000001, 0x5, 0xffff, 0xfffffffffffffff9]}, {0xf, 0x0, [0x3, 0x80, 0x100000001, 0x0, 0x80000000, 0x1ff, 0x1, 0x3, 0x2, 0x0, 0x31, 0xe040, 0xb2, 0x3, 0x16ea]}], 0xffffffffffffffff, 0x1, 0x1, 0x288}}, 0x20) 16:51:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000ffb800"}, 0x1c) 16:51:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:18 executing program 1: memfd_create(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) uname(&(0x7f0000000600)=""/102) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fstat(0xffffffffffffffff, &(0x7f0000000440)) ioctl$int_out(0xffffffffffffffff, 0x5462, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000740)) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) sendfile(r0, r0, 0x0, 0x2000005) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000380)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'netdevsim0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000b80)) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:51:18 executing program 2: socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:18 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000001c0)=""/211, &(0x7f0000000040)=0xd3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:18 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000007fdc00"}, 0x1c) 16:51:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:18 executing program 2: socket(0x10, 0x803, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x3f00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000003e800"}, 0x1c) 16:51:19 executing program 2: socket(0x10, 0x803, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000280)="2600080022004701050007008980e8bc9ea931c1dd507a0681ff06006d20002b1f00c0e9ff09b300001b0000000000006ac5241681b8c93487b3f398e15127bd35536f8673a1a33f5a0ceda8828f0058484b50a350d244de32925765faf1cb0209282935e878325d7d755780b33e48ac15100a003e3e20e9b2b47c927448ccabc0a2495ff01f917d53f1959b7303a5d4fbb81860156e23ac775746c254627d", 0x9f) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:19 executing program 2: socket(0x10, 0x803, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fffffdef00"}, 0x1c) 16:51:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty={[0x0, 0xffffffffffffffff]}, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:51:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc)=0x5, 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000001f400"}, 0x1c) 16:51:19 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1006}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x25, 0xfa00, {{0xa, 0x4e24, 0x3ff, @empty={[0x0, 0xffffffffffffffff]}, 0x7dd7}, {0xa, 0x4e21, 0x3, @ipv4={[], [], @remote}, 0x1}, 0xffffffffffffffff, 0x7}}, 0x12d) 16:51:19 executing program 1 (fault-call:1 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:19 executing program 4 (fault-call:1 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 805.633503][T26786] FAULT_INJECTION: forcing a failure. [ 805.633503][T26786] name failslab, interval 1, probability 0, space 0, times 0 16:51:20 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) [ 805.713744][T26786] CPU: 1 PID: 26786 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 805.721756][T26786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.731816][T26786] Call Trace: [ 805.735133][T26786] dump_stack+0x172/0x1f0 [ 805.739494][T26786] should_fail.cold+0xa/0x15 [ 805.744115][T26786] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 805.749941][T26786] ? ___might_sleep+0x163/0x280 [ 805.754807][T26786] __should_failslab+0x121/0x190 [ 805.759761][T26786] should_failslab+0x9/0x14 [ 805.764273][T26786] __kmalloc_track_caller+0x2d8/0x740 [ 805.769751][T26786] ? map_lookup_elem+0x35a/0xe70 [ 805.774707][T26786] memdup_user+0x26/0xb0 [ 805.778959][T26786] map_lookup_elem+0x35a/0xe70 [ 805.783744][T26786] __do_sys_bpf+0x160f/0x3e50 [ 805.788441][T26786] ? bpf_prog_load+0x14a0/0x14a0 [ 805.793383][T26786] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 805.798948][T26786] ? wait_for_completion+0x440/0x440 [ 805.804257][T26786] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 805.810503][T26786] ? fput_many+0x12c/0x1a0 [ 805.814934][T26786] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 805.820392][T26786] ? do_syscall_64+0x26/0x610 [ 805.825072][T26786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.831135][T26786] ? do_syscall_64+0x26/0x610 [ 805.835817][T26786] __x64_sys_bpf+0x73/0xb0 [ 805.840236][T26786] do_syscall_64+0x103/0x610 [ 805.844827][T26786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.850716][T26786] RIP: 0033:0x458209 [ 805.854613][T26786] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 805.874214][T26786] RSP: 002b:00007f1c3cf5bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 805.882621][T26786] RAX: ffffffffffffffda RBX: 00007f1c3cf5bc90 RCX: 0000000000458209 [ 805.890598][T26786] RDX: 0000000000000018 RSI: 00000000200002c0 RDI: 0000000000000001 [ 805.898563][T26786] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 805.906563][T26786] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c3cf5c6d4 16:51:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000fffffff500"}, 0x1c) [ 805.914538][T26786] R13: 00000000004be445 R14: 00000000004ceab0 R15: 0000000000000004 16:51:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:20 executing program 1 (fault-call:1 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000fc00"}, 0x1c) [ 806.163855][T27370] FAULT_INJECTION: forcing a failure. [ 806.163855][T27370] name failslab, interval 1, probability 0, space 0, times 0 [ 806.207132][T27370] CPU: 1 PID: 27370 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 806.215153][T27370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.225221][T27370] Call Trace: [ 806.228523][T27370] dump_stack+0x172/0x1f0 [ 806.232883][T27370] should_fail.cold+0xa/0x15 [ 806.237483][T27370] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 806.243297][T27370] ? ___might_sleep+0x163/0x280 [ 806.248168][T27370] __should_failslab+0x121/0x190 [ 806.253108][T27370] should_failslab+0x9/0x14 [ 806.257611][T27370] __kmalloc+0x2dc/0x740 [ 806.261856][T27370] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 806.268100][T27370] ? _copy_from_user+0xdd/0x150 [ 806.273038][T27370] ? map_lookup_elem+0x4e5/0xe70 [ 806.277976][T27370] map_lookup_elem+0x4e5/0xe70 [ 806.282750][T27370] __do_sys_bpf+0x160f/0x3e50 [ 806.287436][T27370] ? bpf_prog_load+0x14a0/0x14a0 [ 806.292371][T27370] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 806.297921][T27370] ? wait_for_completion+0x440/0x440 [ 806.303215][T27370] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 806.309451][T27370] ? fput_many+0x12c/0x1a0 [ 806.313885][T27370] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 806.319345][T27370] ? do_syscall_64+0x26/0x610 [ 806.324020][T27370] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.330087][T27370] ? do_syscall_64+0x26/0x610 [ 806.334767][T27370] __x64_sys_bpf+0x73/0xb0 [ 806.339187][T27370] do_syscall_64+0x103/0x610 [ 806.343780][T27370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.349669][T27370] RIP: 0033:0x458209 [ 806.353561][T27370] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 806.373172][T27370] RSP: 002b:00007f1c3cf5bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 806.381610][T27370] RAX: ffffffffffffffda RBX: 00007f1c3cf5bc90 RCX: 0000000000458209 [ 806.389589][T27370] RDX: 0000000000000018 RSI: 00000000200002c0 RDI: 0000000000000001 [ 806.397559][T27370] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 806.405538][T27370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1c3cf5c6d4 [ 806.413514][T27370] R13: 00000000004be445 R14: 00000000004ceab0 R15: 0000000000000004 16:51:20 executing program 0: r0 = socket(0x10, 0x803, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000001c0)=""/206, &(0x7f0000000040)=0xce) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x10000, 0x800) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000002c0)={0x0, 0x7ff, 0x6, [], &(0x7f0000000100)=0x8}) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200fe00000000000000000000a1", 0x12, 0xffffffffffffffff, 0x0, 0xfffffffffffffe49) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000300)={0xdf, 0x3e30, 0x4, 0x3, 0x5}, 0x14) 16:51:20 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4005}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:20 executing program 1 (fault-call:1 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000080fe00"}, 0x1c) 16:51:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 2: socket(0x0, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000c0fe00"}, 0x1c) 16:51:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4006}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:21 executing program 0: r0 = socket(0x1, 0x80006, 0xfffffffffffff7ff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) fanotify_mark(r1, 0x10, 0x40000020, r1, &(0x7f00000001c0)='\x00') ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000100)={0x0, 0x7fff, 0x8, &(0x7f0000000080)=0x3}) 16:51:21 executing program 2: socket(0x0, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x5, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4007}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000a82ff0fe00"}, 0x1c) 16:51:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x6, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 2: socket(0x0, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x7, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000ff00"}, 0x1c) 16:51:21 executing program 0: r0 = socket(0x17, 0x4, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:21 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4008}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x6, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:21 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x8, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:21 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x7, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x9, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000fff00"}, 0x1c) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x8, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4009}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xa, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000340)="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", 0x2ea) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="12000000ae460000007b80e4ffff070000a1", 0xf, 0x10, 0x0, 0xffffffffffffffe0) 16:51:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x9, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000effdffff00"}, 0x1c) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xb, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xa, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xc, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xb, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000008dffffff00"}, 0x1c) 16:51:22 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) bind$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @host}, 0x10) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:22 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4010}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xd, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xc, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:22 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xe, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:22 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000091ffffff00"}, 0x1c) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xd, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0xf, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4048}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:23 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:23 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xe, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x10, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000f5ffffff00"}, 0x1c) 16:51:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x404c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xf, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x11, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x10, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x12, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:23 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x13, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4068}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x11, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000003233dafb7000"}, 0x1c) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x14, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x12, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x70) 16:51:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000200"}, 0x1c) 16:51:24 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x13, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x406c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:24 executing program 0: r0 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x5c82, @loopback, 0x4}, @in6={0xa, 0x4e21, 0x593c, @rand_addr="a01fd139d47db2cbee85d55dba9b3aec", 0x40}], 0x38) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x100, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000000c0)=0x8, 0x4) 16:51:24 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x200000a0) 16:51:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000f0ffffff7f00"}, 0x1c) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x14, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:24 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2200, 0x0) connect$unix(r1, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e21}, 0x6e) 16:51:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x407a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:24 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x300, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(0xffffffffffffffff, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000500"}, 0x1c) 16:51:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000040)=0xe8) r2 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f00000002c0)={'bond_slave_1\x00', {0x2, 0x4e24, @local}}) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) ppoll(&(0x7f0000000300)=[{r2, 0x5000}], 0x1, &(0x7f0000000380)={r3, r4+30000000}, &(0x7f00000003c0)={0x9}, 0x8) r5 = syz_open_dev$audion(&(0x7f0000000400)='/dev/audio#\x00', 0x1f1, 0x400001) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r5, 0x40405515, &(0x7f0000000440)={0x7, 0x0, 0xff, 0x80000001}) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x3, 0x1}, {0x2b1, 0x6}], r1}, 0x18, 0x2) r6 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_GET_API_VERSION(r6, 0xae00, 0x0) write$FUSE_OPEN(r6, &(0x7f0000000280)={0x20, 0xfffffffffdffffda, 0x3, {0x0, 0x4}}, 0xa9) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0xffffff1f, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:24 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4400}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000007ffffffff000"}, 0x1c) 16:51:25 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:25 executing program 4: syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x26000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0xfffffffffffffffd, 0x4, 0x0, 0x1000000000007, 0x6, r0, 0x9}, 0x2c) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000240)) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x100, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f00000000c0)=0xffffffff) r4 = msgget(0x2, 0x4) socket$can_raw(0x1d, 0x3, 0x1) msgsnd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x94, 0x800) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) 16:51:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) fchmod(r1, 0x100) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b00000000000000a1", 0x160, 0x0, 0x0, 0x79) 16:51:25 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, 0x0, 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000100"}, 0x1c) 16:51:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x420c3, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x100, 0xffffffffffffffd8, 0x5}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r1, 0x6, 0x424, 0x91}, &(0x7f00000002c0)=0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/127, 0x7f, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r3, 0x4) 16:51:25 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xffff8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:25 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:25 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000040)={0x3, 0xfff}) r2 = dup3(r0, r0, 0x80000) sendto$inet6(r2, &(0x7f00000000c0)="b963cb5279780a5cf8b12f01fcd9e35f03e347132d6b21e29dc38067251d8478ab3317b942138f2d36aa5159d457725ac82449f8d4eb83163de2640cc56e91cdd77c8c6e52cb6ca9e9bb841ab267e4a50afadad352d7f062278926043b6f93b7234742cd3262e6719c2902d54fb87aa79e92a0183401529d633c9b8c30ead6ce54fa2eb77f15c89f6772560974970bb287bb41a28c20101aeb81c325b543d26f7dd93a308122aa677df7adef960368827e1a9ff5509889be61d14a6f00b1b5a6955322e7f5fb37604a521f36d36a2daafa7fd8355c5fa7c30340b9a8701d148337fadce1a62f", 0xe6, 0x20000000, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000200)={0x7b, 0x0, [0x40, 0x7, 0xff, 0x7]}) ioctl$RTC_WIE_OFF(r2, 0x7010) 16:51:25 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xffffa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:25 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) fdatasync(r1) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x70) 16:51:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000200"}, 0x1c) 16:51:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$UHID_INPUT(r1, &(0x7f0000000200)={0x8, "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", 0x1000}, 0x1006) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x200002d8) 16:51:26 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:26 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc)=0xfffffffffffffffc, 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x25, {'user_id'}, 0x2c, {'group_id'}}) 16:51:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x1}, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x4, 0x58, 0x984}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x4, 0x2}, &(0x7f0000000180)=0x8) 16:51:26 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000280)={0x4, 0xe53, &(0x7f0000000100)="74ea85f69ef5d664d080edc1b0d3f63b1016d149f0aacab2ddfa7f0a1600066b39d7014809714ca4", &(0x7f00000001c0)="f00327990f99aaf0f29ef1bf8ac4b426c1eb6c4634ec51d272d5eb048eac7608b36c538c8792c7ccf7ed85d04ff067a353daac669ba3024cf6400e5a813bc07a17add7c6e683e662d9b6b8d0515376dc26f5bb87e32a7c663b41fc2d8b79572b131aa51a3361cfe4a6c0e0ec5d1a74a2fe66f8c2203355605ccced4b41d9fc76ce93745a701a6508a9a8181412d21295fde5c94372c7c4b3bbbbcf8f", 0x28, 0x9c}) 16:51:26 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'#ser_id'}, 0x2c, {'group_id'}}) 16:51:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8, 0xffffffffffffffff, 0xfffffffffffffffe}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:26 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) 16:51:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0xd}, 0xfffffffffffffe42) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040)="8cbf95ab47b91aa057b7544a6058fedab4d7c8b18fea7cc82eeab47bc560b1080a3aed3696a2a73df4fea8e4bfa6dc306477e45aeaf4786a04a2f05675c0aebbee491b6dd24acad7cb90c26219c907309b8e0bbec6ecdf098258f0b345f29f21d77e159ebd4452ddbbbd59a5f3be54e40e48084f42cb0000000000000000000000000000000016ca570525489970c3aefb7acb7dd245f9819046478ee8", 0x0}, 0x18) 16:51:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000300"}, 0x1c) 16:51:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1d8) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000100)) getsockopt$sock_buf(r1, 0x1, 0x3d, &(0x7f0000000000)=""/29, &(0x7f0000000040)=0x1d) 16:51:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x3fb) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000002c0)={@mcast2, 0x0}, &(0x7f0000000300)=0x14) accept4(r0, &(0x7f0000001380)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000001400)=0x80, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000016c0)={@broadcast, @empty, 0x0}, &(0x7f0000001700)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000001780)={@rand_addr, 0x0}, &(0x7f00000017c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001800)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000001900)=0xe8) accept4$packet(r0, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001a80)={'veth0_to_team\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001ec0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001e80)={&(0x7f0000001ac0)={0x3b8, r1, 0x600, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x9c, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x10001, 0xfffffffffffff000, 0x5, 0x40}, {0x9, 0x2, 0x8, 0x5}, {0x73c, 0x0, 0x1, 0x1}, {0x8, 0x7, 0x0, 0x5ec}, {0x6, 0x2, 0x4}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x1bc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x7, 0x8001, 0x2, 0x101}, {0x7fff, 0x8, 0x101, 0x3be}, {0x4, 0x0, 0x34, 0x6e0}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r9}, {0xf0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9bc9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}]}}]}, 0x3b8}, 0x1, 0x0, 0x0, 0x4800}, 0x4000010) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/245, 0xf5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'%ser_id'}, 0x2c, {'group_id'}}) 16:51:27 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) 16:51:27 executing program 2: socket(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) 16:51:27 executing program 4: setitimer(0x1, &(0x7f0000000240)={{0x0, 0x7530}}, &(0x7f0000000200)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) getitimer(0x3, &(0x7f00000001c0)) ioctl$int_in(r0, 0x5421, &(0x7f00000000c0)=0x5) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000100)={@remote, @multicast2}, 0x8) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e24, 0xf04, @ipv4={[], [], @rand_addr=0x10001}, 0xbba}, {0xa, 0x4e21, 0x0, @mcast1, 0x1ff}, 0x101, [0x8, 0x0, 0xfff, 0x7, 0xd671, 0x6, 0x2, 0x9]}, 0x5c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000280)={{0xa, 0x4e22, 0x4, @remote}, {0xa, 0x4e23, 0xfff, @ipv4={[], [], @remote}, 0x7fff}, 0x3853, [0x3, 0x2, 0x80, 0x783, 0xfffffffffffffffa, 0x5, 0x3]}, 0x5c) 16:51:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000300)="fb6dbce91aec9f99afe2d3763da051b67da7161b9d3684d4c05c4c4e02c8bc0e9324dc678f22f262b76f1f4e311d7728ef8943f5af691ef3bb26bf67e662a5c80d1cfc4f13ac8368b3e60126d58390813e4ca7dd12901af855907e0cd3711701514f0ef4d62ddca885276bcdff1ae95c224416386462c378b2f3b4403a5d60698a29d2515ee5864e1000000100ff6875ca885b1f2c030000005275ff5715756e7360e2355db80a44d2a0c474d087be05000000db53d26999e3364e7a6d0100000016e8337dd84a1b6276fadea3c193916cb59fa4f46891002629c1a4d5f959ed8588b9000000000000", 0x0}, 0x19e) 16:51:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'*ser_id'}, 0x2c, {'group_id'}}) 16:51:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040)="d1b6f5c6bb3fb81f492fb65a0a92c6b1a7f28e567baa5e9bb8fa0a07b9a98f440c9cbbec829eb58be2b25a05ded48c48b929bad783276ee1fe5ca72fab3462f56213c0fe505641fd30d7ccc55555d40bd931060456c55f43284549b59646f17681f2a20ae7ff8ff96a678fdba3dad14988255dfcbfdff8a71d6c4d19d272130b7e5dd9972ff8a4c7eda8707b6ee908227a99a1eca44dc2f8f82d83c8dc8aa3d3b8c7c9ae655098408a1c1300a7921131d1244cb7af01301ee74089fb88bf6fa5c025a4f01302cbc78918ff9b6301", 0x0}, 0x18) 16:51:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000000), 0x4) [ 813.135637][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.141482][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 813.215646][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 813.221520][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 813.227370][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 813.233137][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:51:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000400"}, 0x1c) 16:51:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x54000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4800}, 0x40000) 16:51:27 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @initdev, @broadcast}, &(0x7f00000001c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r2, 0x1, 0x6}, 0x10) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000080)={0x0, {0x400, 0x1, 0x1, 0x8, 0xfff, 0x9}}) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000400)={0xfffffffffffffc5e, 0x0, &(0x7f0000000440)}) sendto(r0, &(0x7f00000000c0)="120000001200f70ffc981e00ce61000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='+\x00') 16:51:27 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'+ser_id'}, 0x2c, {'group_id'}}) 16:51:27 executing program 4: r0 = open(&(0x7f0000000380)='./file0\x00', 0x80, 0x132) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000003c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000300)={r1, 0x0, 0x0}, 0xffffffffffffff43) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, r2, 0x0, 0xd, &(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff}, 0x30) sched_rr_get_interval(r3, &(0x7f0000000340)) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000002c0)=""/37) pselect6(0x40, &(0x7f00000000c0)={0x5, 0x3ff, 0x3, 0x3, 0xb80, 0x3, 0x8, 0x1}, &(0x7f0000000080)={0x7, 0x2e2, 0x7fff, 0x8, 0x3d, 0x1615, 0xffffffffffff4184, 0x2}, &(0x7f0000000140)={0xff, 0x1, 0x8, 0xfffffffffffffc01, 0x4, 0x18000000000, 0x6, 0xbb50}, &(0x7f0000000180), &(0x7f0000000240)={&(0x7f0000000200)={0xff}, 0x8}) socket$can_bcm(0x1d, 0x2, 0x2) 16:51:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') getdents(r0, &(0x7f0000000380)=""/232, 0x29) 16:51:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) 16:51:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x8a, "45639e31401c274577e8340310d5f50cbe6b58e1c30f99d20a402beb7c355256d5a0f5c521203e33725e1c7129dd1da7fbbfb9ee004b2949be8e9951a416d529b1daa1153f794db5be910070973e5db9657ebde5399ad0fce2427cae049f5513879098ef13ebc381ef9014599deaf20b46270f65a29ad6920532c83ce573fb5ae372a5d9dfd6122ac75e"}, &(0x7f0000000040)=0x92) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x180}, 0x8) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e21, @broadcast}, {0x1, @dev={[], 0x21}}, 0x26, {0x2, 0x4e21, @empty}, 'team_slave_0\x00'}) 16:51:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'-ser_id'}, 0x2c, {'group_id'}}) 16:51:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) io_setup(0x10000, &(0x7f0000000040)=0x0) io_destroy(r1) 16:51:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000001c0)=0xffffffffffffffff, 0xffffffc1) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0xfffffea4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000040)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x1) 16:51:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'.ser_id'}, 0x2c, {'group_id'}}) 16:51:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000500"}, 0x1c) 16:51:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x111100, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7, 0x2010, r0, 0x0) 16:51:28 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0xa35) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(0x0, 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) tkill(0x0, 0x0) 16:51:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0xfffffffffffffd9c) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xf}}, 0x8}}, 0x80, 0x0, 0x7ff, 0x1, 0x1ff}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x8}, 0x8) 16:51:28 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'0ser_id'}, 0x2c, {'group_id'}}) 16:51:28 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)=""/64) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:28 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6db1, 0x480) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000080)={0x6, 0x4}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = semget$private(0x0, 0x3, 0xa) semctl$IPC_INFO(r1, 0x5, 0x3, &(0x7f0000000000)=""/8) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x620, 0x2a0, 0x2a0, 0x2a0, 0x440, 0x440, 0x550, 0x550, 0x550, 0x550, 0x550, 0x5, &(0x7f00000000c0), {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0xea}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv6=@remote, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @gre_key=0x5, @gre_key=0x1}}}, {{@ipv6={@ipv4={[], [], @empty}, @ipv4={[], [], @remote}, [0xffffffff, 0xffffff00, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff, 0xffffff00], 'bridge_slave_1\x00', 'vcan0\x00', {}, {0x97bab937632dbde9}, 0x8, 0x5, 0x7, 0x41}, 0x0, 0x120, 0x168, 0x0, {}, [@common=@eui64={0x28, 'eui64\x00'}, @common=@frag={0x30, 'frag\x00', 0x0, {0xfffffffffffffff9, 0x1, 0x1, 0x10, 0x2}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x1, @ipv4=@empty, @ipv4=@rand_addr=0x6, @gre_key=0x50, @gre_key=0xfff}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x29}, @mcast1, [0xff000000, 0xff, 0xff000000], [0xff, 0xff000000], 'veth1_to_bond\x00', 'team_slave_1\x00', {}, {}, 0x21, 0x200, 0x7, 0x1}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@hbh={0x48, 'hbh\x00', 0x0, {0x2, 0x7, 0x1, [0x3ff, 0x4cf3, 0x2, 0x1, 0x4, 0x7fffffff, 0xff, 0x0, 0x4, 0x5, 0xa2, 0xc19, 0x6, 0x8, 0x95fc, 0x8], 0xa}}, @common=@unspec=@nfacct={0x48, 'nfacct\x00', 0x0, {'syz1\x00', 0xfff}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv4=@rand_addr=0xe3a, @ipv6=@mcast1, @gre_key=0x3ff, @icmp_id=0x68}}}, {{@ipv6={@local, @dev={0xfe, 0x80, [], 0x14}, [0xffffffff, 0xff000000, 0xffffff00, 0xff000000], [0xff, 0xffffff00], 'syz_tun\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x5e, 0xfd5, 0x1, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x14, @ipv4=@empty, @ipv6=@empty, @gre_key=0x3, @gre_key=0x7c2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x680) 16:51:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'Xser_id'}, 0x2c, {'group_id'}}) 16:51:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/stat\x00') mkdirat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x1ff) 16:51:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000080)=0x5000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040), 0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1b, 0x2, 0x3, 0x3, 0x20, r0, 0x6}, 0x2c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x8001, 0x8001, 0x9, 0x6}) 16:51:29 executing program 4: prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000600"}, 0x1c) 16:51:29 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='attr/current\x00') syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socket(0x1000000000000010, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000280)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 16:51:29 executing program 0: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000001c40)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@local, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@multicast1}}, &(0x7f0000003000)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000030c0)={0x0, @multicast2, @empty}, &(0x7f0000003100)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000003280)={@mcast2, 0x0}, &(0x7f00000032c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003300)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003440)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000003540)=0xe8) accept4$packet(r0, &(0x7f0000003580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000035c0)=0x14, 0x80800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000037c0)={0x0, @initdev, @initdev}, &(0x7f0000003800)=0xc) getpeername(r0, &(0x7f0000003840)=@can={0x1d, 0x0}, &(0x7f00000038c0)=0x80) getpeername$packet(r0, &(0x7f00000039c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003a00)=0x14) getsockname$packet(r0, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000003ac0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000003bc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000003c00)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000003d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003e00)={{{@in6=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000003f00)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000074c0)={@dev, 0x0}, &(0x7f0000007500)=0x14) getpeername$packet(r0, &(0x7f0000009a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000009ac0)=0x14) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f000000a0c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc2080}, 0xc, &(0x7f000000a080)={&(0x7f0000009b00)={0x558, r1, 0x302, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r6}, {0x178, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x1fc, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0xb4, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfbc}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}]}, 0x558}, 0x1, 0x0, 0x0, 0x10}, 0x40000) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'cser_id'}, 0x2c, {'group_id'}}) 16:51:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9, 0x40000000000}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xffff}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$VIDIOC_S_FREQUENCY(r3, 0x402c5639, &(0x7f00000000c0)={0x8, 0x0, 0x9}) ioctl$BLKRAGET(r3, 0x1263, &(0x7f0000000080)) 16:51:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = fcntl$dupfd(r0, 0x20, r0) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000000)=0x6) 16:51:29 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) 16:51:29 executing program 4: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x1}, 0x20) 16:51:29 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'dser_id'}, 0x2c, {'group_id'}}) 16:51:29 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') 16:51:30 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x20000, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000180)="65190dd2cace5c71840af2ad50c2b86dd4c48f7451f9ec2a03f8c4f616a47ae4c5378bebdfcca4c0b3aea6e3841d3ff2059f927f98af2cf8f4080a8ab2ab6799e79f14a07a82e8ffdcdc034977d89bde4a6c8743998fea989b6ca5041ea19b4ee18beaa18992eba57146a5bd63a9b9e796778fd14492ac5cd3b979973da03d", 0x0}, 0x96be) 16:51:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x81, 0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0xc, 0x0, 0xffffffffffffff05) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000000080)="0135029cca1d9df536f1333849513a6fb93f126d7f8e", 0x16, r1}, 0x68) 16:51:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:51:30 executing program 2: ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000080)={0x0, 0x0, @ioapic={0x10d002, 0x4000000, 0x7, 0x5, 0x0, [{0x571, 0x0, 0x0, [], 0x1200000}, {0x7, 0x7}, {0xb63f, 0x0, 0x9, [], 0x9b}, {0x0, 0x8001, 0x20}, {0x0, 0x4, 0x0, [], 0x5}, {0x9}, {0xa2f1}, {0x1f}, {0x6, 0x2}, {0x5, 0x0, 0x8, [], 0x80000001}, {0x0, 0x9329, 0x3}, {0x6, 0x7ff}, {0xf890, 0x80000000, 0x8000}, {0x0, 0x1, 0x800, [], 0x9}, {0x0, 0x0, 0x34}, {0x0, 0x0, 0x5, [], 0x9}, {0x2, 0x0, 0x3ff, [], 0x2}, {0x0, 0x0, 0x0, [], 0x7}, {0x4, 0x9}, {0x9, 0x7}, {0xcc, 0x3f, 0x2000000000000000, [], 0x800}, {0xfffffffffffffff7, 0x8, 0xffff, [], 0x3}, {0x0, 0x0, 0x5500, [], 0x1}, {0x0, 0x0, 0x10001}]}}) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={@dev, 0x0, r1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 16:51:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'iser_id'}, 0x2c, {'group_id'}}) 16:51:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x24) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040), 0x0}, 0x18) r1 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) 16:51:30 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'team0\x00', 0x1}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x73c9a6307434356d, 0x0) getdents(r2, &(0x7f00000001c0)=""/244, 0xf4) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000440), &(0x7f0000000480)=0x4) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {&(0x7f00000002c0)}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) open(&(0x7f00000004c0)='./file0\x00', 0x20000, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 16:51:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'lser_id'}, 0x2c, {'group_id'}}) 16:51:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = socket(0x0, 0xfffffffffffffffd, 0x1) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x1000, "f50df9d71ec1ed4b50a3943a59aac18987663bd09b65602a1b44988613aeb8a697ffacfd3e8442fa588e304be784e4e04300f6b3fe65fd102e031ee1e9a46148fc96eb49a0691868aa7a8530374079235de7c8bc9dc99e730db19e6fa8020b890eced90c1dcd9f0a2655ece7d77e30236a69b5441f2999dc382474080036950d4d95df9524e3d215c1bb8f949fa831219b90ef782368562a3c0230dce4d6650e5015868af386a280273912a94fda0af7f74b61c732e65279fd3ab52627dbd3ff269f2706f686444634886413b07f05a23384190237a6a0770ba09be9bad977fe9ccbcc5440584170da28819d94970bcaab668bd54162d5d2b0f53151b73da1ac316acb1dccfdb75b3b9005a0b8a9b1f69fd6af71fa21e4d3ce098b1e7984b11e7222f537ba7a01dc72b1496d42a29a09b20025b638241fcd2a9c60fde51a82fe3b0846117c06ab48c4a9e09805fc9edd34589a9aa0010bd96eab5e7f365b115af368f3e0886a6a16d5ade1afd928df4c537df4ffaa8d650b0f7d4f20508b1da47a27f9764e14e4ddedf6c9617bd4c2032389df48a945d48ee457411e2dfb9bbf718765b66c81e442c7e46ed0be9560b58c50ff05071d826a3fdad479923ec244eed0dd534bddbe8b731d3c9e36dad22effc3b4cecc1c562039a53aa24bed66b7c32334abb68fb11d948eb7a85c86f6a2e26d560f9452e475372103099e08f707b27784a9362550e23c732456c51d7083a9ed2803cf7c89c188902c6c9770a4fd734d0ad016c8ab28a4a7a28c424b45d8fc59ab01acc47db7e3f147b42904a8623ae72a6bc77a7a85abf6e0849be7c83d1ada59ba8d75a490d7172e3bfcd54993ea2e30b95b8d4d5b7c03e6b829f7e498c12e398e45e895865a6e33f55d91cf774c007b3383ed87be993fc836a5346c61a571dbf8db4c2512e10cd7b305dd1cbf9a0ed280b1c2ad7e086988785fa61ef8a73943037f0af4f2f3655316d2c91e6f84665d1cd2a727a8bf2cc2acf8c2622dada414fd7ce4baf6b0e8263dd4cce81fc3de59d9b19f3217dcc939d94a7d0f0148b29c58130cb9ed1fc46a9c7fc29446b769f7499636d20caf49ca52e3a9ffee52133fb68f899f4d1df1994c31981d9622d0f41e8914c2be49eda3ddec9c12d8828d504176b63fb6c83f915d65ba4ae1a4c9aeeb59ee3457e0658fdb4b35cf54c8c6bd6cce9d4d2a7adc4897c13d94faa7e5f725b844d1df21dcb7e7e5aecce96a9aa02ada3f611b6507225f3ddb1556bbb665f30847c50737a3db7698f89b817772b6b458a3bab15afa3dae502733a76aec8257ff8794eabbc2a4ddb0a4bb511835a97282bc9b1c2a66e8bed3710112619a1acc6dea20caa0d5152d3fb21672ec786507a938b237260e4c12371667dd55a71a621260c2a8ed7a49a21197d00ba8a326031e852d166f1de867d5e63c8089ad6908d9f84e81d18d942831df772097b66fff6718a112e683c35d91a6edeebe30678a944e14136b5990d02704c71c5ad79fc13bdf34fc63838fefca5254d6fbb73906d128d4d34480e7ede35b5c2d4efad8423d3e636b79e36e2ee4423d82cc4d6ff3921f80899d9f330db531c03de7cfe8c6a242055a704d494e578aac4037746ab6f3856805c2089364ab82b312b066b712b785ffa9f97e58057a405bd669a1dd7e2ed22866a73b7ed89619654d81c3a710cda3186c01eafea1b2fa38a68048ee05ffcf18171f101f12b6b809c2419a2860b503707b38d4cb73bf0f29627268abe9f531f64c77ef45f247a3770d4e30a0f6ae3773a3b4c52e4f7f2e566a1a7a24d8c5cb04367ff795470ef4dee4bacdb0e813cdeb42e725a466f2504efb86f4d342a68fc1603fa930bb20f4d49b92d32ee36e4e44c5fb9197649c0f238afbb3b050616df611c69d5dda6cda549c88980f4c128b15f398af1c67af77a1149746436f79104b13b5443652d7e33190960b04ff7d316c9d7b37eb65a6d2c8e20edced71da65004f48142b36ea6a622ece87b6e16d323b30445366f91ff56357db5f521101ecdddf0e895aa33a4a95249d270dac1c7bfca343f0d340152a130c3379e960549f833949b8d2e3507ee3a2402072c94561ea7e1f42705cedcb0fc578a78e31a77a0ba71f144a636b5b90a0d4291c038dafe35146b49e96197a4be1f9d188a07d43212f6659a2def43b7f6fa0c3eda69461e72e9c68b669b80f07407ed4991ed334988b18fc52e31808c23b74ecfc7d7a59c6e86f8bbb67d287d12942ad36404430f7323f4533a8fb6c1bcc2e22b6ced68e83652eae0432c0a95add4af1a1e945610ce7812cd84e46279839ca0645aa881a23329779a1c8f8c4d1f0c0fd95994d9144d8f70b0713696def22b9ae9d29510f6164d3d803f6883e405ee5078d8709410680b12c4149547c23b252b4a19050655857c27cb73ee677cc62710c1b9fcb9c05994376fd8972d668fbdc1c408ba25afaf4869206296dfcbe1b16abd6664fad66ad86b3a71bdfa1ddc02c30ba46b7a72304257719c4a4c631fa42b2a84bd5b6168b8dc58d34af7fc8cda4a1e1564396b0221964fa55d82ce1ffb78fc9ec75ad79073fbc7a6d21c2d148dba7354e2243afd05fe36f12f2426b35a320d6f1ae71a53dd8b47e020b4995205ae3a3e577b7d4abf76e94b3d652d7364752fa7c9adbc5035dc4f613269f8d14aafbdab5b730a3f30d2593ca9e94231e2d9e48ec39497a62dbc735c2bccd6064c3efe004e8925740698e70a4238df8ebd56afffe964820270131b26fd0dddbc9f6f554a0131f349e30cd93f1c1f690baf895231aa19b780d9cf8ce8e211808626d760c98d1373a80d02fdca35c3ab877d7ca8e1af0a3aa4208b2c8f194cf2a8da3cd8d44988bdeab01edacc61143f8b91f7f42bc329586328d7f1b540f3aeace21505ec5c6d25a5a7b6106a25ec28bfc468e0135f6c7cff9dbec484bd4bccf21202a580e4e602b9849af18673831884af069d8ddc92debcfe5a947db6d83e2405fbf2363a191c3ecf1764b977d562a8ff2e283212999e63a04994c89ee56c277fa34f98fde820a616b142dae232edf0be94419ade94fbcbbef6008acd360cf970b2a1bc3450032e9ee962f074a8ef6a311fa2f2435dfc497859d366c103e5a260e8c38d68d1aad4fd6066373192aba25bb98de99011f07b6cb081cda18592f5ac03e40ab34c5cd0f873dc1c753f308c95f030f5a2a1610318bd84245114b5c722574f3df2952077d1a0ba85130d42d1094315497859f0b8fd84236014234f54a6ec00f92218aec48ae45bd02ccdb9c5cdb3cf02a61cb6b9dd178ea7878c7be68188619a490f0bb568ce115b54792d7e6cdf690a7bbb40db24cf0cbf70916f1b47babaf9084ed321146fe6eeba29f7d24f2070af91ab81c51b27eaafa174624cf30d339c7b7d9bc009effee25b6cf567906c3216e3c5789491ee6814f71f476bab31e923bf1991f1c9f5f72fbee3e9673b7e11bc935eb3d0a9e6c993a50dfaf5086b4dfa7dc098abb051a510dbfe875a1790809d3b1521d0b13cc198a12a63f6520964d95caa51314db5ed3ba6e3b775df8092b7af5af27a9d6bc007d94b357ccb84008f8ec81567abffc7c65d3093732dc247389274a7909aecd7b782e0b9e2405e8d168b7ba3e3c5d6c34f7f8d2efeee092dbb12e9a9888417dd4df1ad43e0ad2e8d4c1629b4c3cccad1c46b3313e9532a6a10a483a32c40855d3a98572207bb35a3a293299600f9ff9b7dc3a01d01033bd67e2250a1fc09161527e258c6d9e7451cdd1cb741297b2b82109bda2426a5d32092f8e86d397ece64ac2e185f176a45fd16fce68f0d3f9364eba80f93f67248bfc5b69dc6805c6e63bdf7ed07ff533db45bd5bf8d82f80e90417917b6ea13309d60941c2448f5552a33f6481606fd57298e755bbb48920417b3cb8f2b228a93a4336e487610374e30aa71b3ed3838713cc717a2798164005c34a0c8a5668c6e8653dd7b118dc17f6688da42d3045bf15fa00a3d59a500f124095a3e93159bce382d387be70094579464c51272daf2d213d1076fba91fc6024427d3229d9e0ee242fed872cdd8150ff32d920fa363092585cb5c50b84dd0b0a6037eb383b4ac08f2c0c93e293851d6faf911304c3ed1434f896d1153cd054f631f59c2e949db647b2e9d3712e3109d319ad07b0a5af177d7991f4add5f79029c9255b96cbf6d34068d24dc1a3cc4c42e57d171aeba13d41c80489bedae0334d1dd7efbf571fd3ed55f75774a8aae2be41b5db54a9f756cd18ee3fdc3e28f4477590fbafa6732f7e1d53fde04d26fa190ec312fac66473c7634d004a30062e6dff8e5b1b28b64a3dd015cb7323783d9401429bcdbdd1da6904147626d1ef66904277619cfa94ec8e8ab52c1e1ae1c299d523be24e51ef09794d789ad34b671833b588c88526b9589b33bf9ea480dbc680d9db2aee56df16da2f802eec8dd49174c636ca4280877cafac15d659661a4b29d50f1cd7889d7e70a97a077b86a485cdf2cc001e2dd0acf47d23059a954ad92e7df398ccbc31af26ddcae974df902de3e4cc0e113d0092811fd4520fe5b44cac22057534201aa85e392784ebba357ba16959a182e2777ab6418b675c7e1056b2f76aec9a69c3ca10a1d4870ffc42cf34a2be9f20a7d27e9b5f15b694b0c9da0659df01309ec60466b03e2fb2fe09be5c11e67197d1f24397df11390969e79ec65dc864a6e567aa6038fa35e6b32188f0d28f985d0ee7f4afd1048bf1c27099a868a8d688a41ce7b03d66074b01ef97665644ee0bf88b33405dd4da9d472f72bf4ef45c4c0c3a85ca155b58b5e5869f108d643293b43e4454b2e0990a04843c1f19f4670f0195827d5282af2669795ae0cdbe4076946c2051f868eb10c0ffead21e1af9b04c4e0ebc6b79cd2561988f0101a09137da9f74aefe5098c189ee835a76f46f721a62865ede6f8c9fdf965b502ad5882ae1280c68277850bc3d903074b299a5e05326c7042353de3561cd73750cb9533675ce3ff9add9e66b1f99736a051ec9f9121fa918baaaf2160db2666c5c124bc09ed3cd918a8d586c76c237152d82942baaa50ec4e07bffe80d9eb97b4459bed6a4243c0ad6b045bf95de05a44d88d937d27ab88292cec76e8106e8f2b823a23dba9cfdbcef1c6bd9baa380839886f15453340168116278db002e0e6aa5ffa6e7b1b0178727cc8d8f38bec7b43a493f10b15bce859b144eb7016d88639532c3105eca7d2dd014635d439217ad1caf0d92669ee66dca933b3678d932a05be79f1f69a5e9427b091e4d01271968dd2c8ee716f17aa32e2d3c25951b634a914036f0f997113273b5c9f3b92bbf315f47ad11c75f99b6e32ef3d660c35e2240b2b8d3b1ff1a452729ed73803bfcf169a586106725f51dc4964dc5fb4d7d5836142f06faa5a0c9ed0db9d7cb5a5e8872d2476bda463106b90e7813a1f163a16ecf0477a3255b4f4f48d77df86351b0e531f3289a6e34ddde5dbf41026513a862eda8810951151897496377385b0d41d2b9534104bf02aefb1fce69e278ff916a091dc24697cce1794a6ce1c29ef46c330aa68c4f5b1050825cb340b0c1af9943d2a74df7a50a9f8a270611289a16f10b6cbb682d457bbb94d75f644ddaf96df20bbb061d9ade4442a4308266ea998194b734ac59ef6ffe9dd4be03d4a038a6cc10c043255a452c84c73840a9d13b7c3ef85038857c1564b523db326c130b8df09fbe427ee7b1911ece3fb3d54b967c3d3a620521c0bc86bef44e4e0b0f3cfe91fbdc61af"}, &(0x7f0000001240)=0x1008) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000001280)={r2, 0x8, 0xb4, "7fa7f34ca6864a6980037f3879ac996e27aa895efafc2894e7ae597e09cbb6a3d165153a14af589d6a297fa22d7d394b6cd95e6a396769f6d968e1b7c5c8dfdb75cf19c62ce6bba0b36ad0c2895f712a9ec86a541d7af215d1508d3b538b442c1a8e2d14fe35c867545bac5c783279807b1939c5f1e14ab08b66e600c71b491fb665fd211d0a79c7af279d6e51968718118dce14aea975042b026ad700b11a08ce5e91f3e3600f3b1f02efa6ba8031b175553f81"}, 0xbc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001380)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000014c0)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x801000}, 0xc, &(0x7f0000001480)={&(0x7f00000013c0)={0xac, r3, 0x500, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0xc}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x20004841}, 0x8080) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x6, @remote}, @in6={0xa, 0x4e20, 0x9, @empty, 0xd908}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x2, 0x2, 0x8000000000003f, 0x8001, 0x3, 0x1, 0xdd1, r4}, &(0x7f0000000180)=0x20) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:30 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x14600, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000000)={0x8, 0x2, 0x8, 0x2, 0x3}) ioctl$KVM_NMI(r0, 0xae9a) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000080)={0x1, 0x0, @pic={0x9, 0x2ae6889c, 0x4, 0x4, 0x0, 0x9ce, 0x2, 0x2, 0x2, 0x8, 0x1, 0x81, 0x0, 0xffffffffffffff03, 0x1, 0x6}}) 16:51:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 816.655621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.661481][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.667358][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.673120][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:51:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'oser_id'}, 0x2c, {'group_id'}}) 16:51:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a04, 0x0) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000000200)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) 16:51:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0xa0080) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x7, 0x758, 0x9}, 0xd) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0xffffffffffffffc5) 16:51:31 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fsync(r0) 16:51:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:51:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'pser_id'}, 0x2c, {'group_id'}}) [ 817.132857][ T5614] syz-executor.5 (5614) used greatest stack depth: 22824 bytes left 16:51:31 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @empty=[0x0, 0x300], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864, 0x11, 0x0, @local, @dev}}}}}}, 0x0) 16:51:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/rt_acct\x00') ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x12) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x240240, 0x0) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000080)={0x9, "eb2e07c76db138ef9a5b35ed02285284fcb99921d7fc337b09090f1beea54193", 0x800, 0x6, 0xfffffffffffffff9, 0x8, 0x4}) 16:51:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = socket(0x10, 0x3, 0x0) write(r3, &(0x7f00000000c0)="2400000052001f0013fd0000000000000200071008000100feffffff0800000000000000", 0x24) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000100)={0x5330, 0x777, &(0x7f0000000200)="9889b4bb190a9f0c4de017f0afcb452aeb63084d975503c859ea2bbf2e95083184ba1cfcf7df689b0f34d97ad0bb48a98f4e8aac39bfbb5fc725b6770f7e31e12bf90921143e6e46f7dfad0db147ef3ee152f9ab62df6488d0dc3f44d44c1aacb3409c6164c0b5d08a16cf51751285353ac41d3ce6a05613676a0afe9ca5f611ac711343184346d9726c4297b6309739d123105621c6200a0d9fe4937e4c25f5d1853fc734ae8a47", &(0x7f00000002c0)="6dab90a77d025a057f8594155115ea96ae213474c7d0da0efb02b45df56c8b1dbee9dfa77a2b72777aa653c2c10ec88bca1e6e56b54f1121c73d4702bc9fcefbb8619338efe6e06f62f6e8963f6ef3859c5750e49793073f6fc1af4f51a0878ee1f7650aba487ee52532b0d6cb7045a3b24522bc514b5c02fc2e7996d54792995ef5ff440a3b33bd1fa6dd58811c2efa5d3bf8f847dbb42eef01b5e415657eb2be6300e30e3bf7a314234dcd4b884756d186cb720f20d4a4222a63000e0abfcf570d0d819d4334221714dbf4b73df0dafdaa7fe39141fe4d4bd97828c8f392e40bf3426eeaf80dc9cbf269edd77a70e18bf4fa", 0xa8, 0xf3}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) 16:51:31 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000080)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00t-\x00'}, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 16:51:31 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'sser_id'}, 0x2c, {'group_id'}}) 16:51:31 executing program 0: socket$inet(0x2, 0x3, 0x5) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)=0x0) prlimit64(r2, 0x0, 0x0, &(0x7f0000000340)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x80, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f00000003c0)=@req3={0x3, 0x10000}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@multicast1, 0x4e22, 0x101, 0x4e23, 0xde, 0x2}}, {{@in6=@remote}, 0x2, @in6=@remote, 0x3505, 0x3, 0x0, 0x101, 0x3ff}}, 0xe8) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000780)=ANY=[], 0x381) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={'veth0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) shutdown(r0, 0x1) 16:51:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c, 0x80800) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000500)=ANY=[@ANYBLOB="00000008000000000a004e2100000000fe80000000000000000000000000001afdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ffffffffffffff000000000000000000000000000000000000000000000000000000000000000001000000070000000a004e22000000d1fe8800000000000000010103000000000000000000000000000000000000000000000000002f6de56d0878e7e2823e5acb1dbf6d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c50000000000000012fa000000000000000000000000000a004e21000000785c73023ce6b6364546cbff11b9cd3b591ab61c6b5b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000009fe80000000000000000000000000002907000000000000000000000000000000000000dfaa664a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e210000000800000000000000000000000000000001f9ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2400000c9500000000000000000008ffffe0000001ff7f0000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0077820000044edd8d8a0bf0a80377c4e77d100a19a0cfff030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000003fe8000000000000000000000000000bb05000000000000000000000000000000000000000000130000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008005000000000000"], 0x410) 16:51:31 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x0) 16:51:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) socket$isdn_base(0x22, 0x3, 0x0) 16:51:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'vser_id'}, 0x2c, {'group_id'}}) 16:51:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:51:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) 16:51:32 executing program 2: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00') getdents64(r0, &(0x7f0000000040)=""/235, 0xeb) getdents(r0, &(0x7f0000000ea9)=""/407, 0x197) 16:51:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0, 0x0, 0x2}, 0x13) 16:51:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'xser_id'}, 0x2c, {'group_id'}}) 16:51:32 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)) 16:51:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) 16:51:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x10, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0xaf7, 0x2, 0x0) 16:51:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0xc00000) 16:51:32 executing program 1: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) 16:51:32 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u#er_id'}, 0x2c, {'group_id'}}) 16:51:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xfffffffffffffffd, 0x4, 0x78b, 0x7, 0x10, 0xffffffffffffffff, 0xffffffffffff8001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) [ 818.208520][ T8456] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:51:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:51:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x8001, 0x4, 0x8}, 0x2c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x109080, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000200)={"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"}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = fcntl$getown(r0, 0x9) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000001440)='/dev/video37\x00', 0x2, 0x0) process_vm_readv(r1, &(0x7f0000000080), 0x0, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/94, 0x5e}, {&(0x7f0000000140)=""/169, 0xa9}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/241, 0xf1}], 0x4, 0x0) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x4, 0x101000) r2 = syz_open_dev$audion(&(0x7f0000001340)='/dev/audio#\x00', 0xfffffffffffffe50, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000001380)={0x0, 0x2}, &(0x7f00000013c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000001400)={r3, 0x80}, 0x8) 16:51:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u%er_id'}, 0x2c, {'group_id'}}) 16:51:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:51:33 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, 0x0) 16:51:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u*er_id'}, 0x2c, {'group_id'}}) 16:51:33 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @local}}, [0x5, 0xeb00, 0xf64, 0x5b6, 0x101, 0x0, 0x9, 0xc117, 0x2, 0x1, 0x5, 0x0, 0x2, 0x4, 0x6]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x6}, 0x8) connect$vsock_dgram(r0, &(0x7f0000000280)={0x28, 0x0, 0xffffffff}, 0x10) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0)={0x0, 0x7ff, 0x80000001, 0x27}, 0x8) creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000040)={r2, 0x0, 0x0}, 0x20) 16:51:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:51:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = getpgrp(0xffffffffffffffff) r2 = getpgid(r1) syz_open_procfs(r2, &(0x7f0000000040)='attr/exec\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000080)="07cb1ba9f3d09921e56d5330de2f9e3917bc74e8a099c965cdbb", 0x0}, 0x2) 16:51:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 16:51:33 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u+er_id'}, 0x2c, {'group_id'}}) 16:51:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000000e00"}, 0x1c) 16:51:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x4, 0x7, 0x7, 0x8}, 0xbb) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) io_setup(0x3, &(0x7f0000000000)=0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x80080, 0x0) io_submit(r1, 0x3, &(0x7f0000000400)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000080)="70bb6fbc20ef1257ad9346e2dcff163dcf4fcb3048ee32eacdca5eb0c3f9add26ae81dea062d412755cf6c5e915c73acee364d3a76c913f323aa4f1496f426680d63c49d309413e605fa95d19ef953ce1de506b799231d418b97e15f4be054aea7d85778ce346d5ab4d2286d1983bbdd553f31e52d58bd62a8658106511deeb999afade6fdbceddc5e9814d36eb62892ba8e083a88ddf13d30f5de2c15b148086413aa8506abd78a911e943a5d9b7017284f8008bb4921b4a5cce3c8a118302b763371d1af8066d7aa345ee23091a334d9aa9e", 0xd3, 0x408000000000, 0x0, 0x1, r2}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0xf, 0xa30, r0, &(0x7f0000000240)="46ba28cfaaf54fd574ab25aaaea4893e44bb5cee356f35677d63408e3266d7ba92a6898687eabf9c0a4c15cfd73d52ea6674357f60621b3e06c7a6181fb04a25e969daa07430a132271a133351bcba97d09b3f857cd01a25956aaec5d47e269cdabdc989f561710290a814442e73e664978d48554cdeb83ab4db8678bb69d412c1e1ac3816763338c52c76b569b01cbf5021e5acc84bcc63e3bebef4", 0x9c, 0x1eac, 0x0, 0x2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x6, r0, &(0x7f0000000340)="370cc10c70b048e8b75e01b7619bb340226c05a62a591301b754f6da9085370cebd9e8f1ea2dbc95156e118b47fdfc9899984a84f4543b370742102dff2404dfb9961e3cea8889f5388b3c", 0x4b, 0x0, 0x0, 0x2, 0xffffffffffffff9c}]) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000440)) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000005c0)={0x1, 0xffffffffffffff9c}) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000580)={0x2, 0x1, [0x6, 0x100000000, 0x101, 0x4, 0x100000001, 0x6, 0x40, 0xfff]}) io_cancel(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xd, 0xda28, r2, &(0x7f0000000480)="a8a387ca4f60047d252d76078dbc2f98d47eae6c7846aedc114e75670b06b7bbe02f3b60406c0df101ddcf8282937697733387a7126ce3ec68570a5ffc58764b0a9ade88d9c2", 0x46, 0x81, 0x0, 0x2, r2}, &(0x7f0000000540)) 16:51:34 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40a85321, &(0x7f00000004c0)={0x0, 0x0, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x0, "7fd82d5e02ca3901", "88e7ed00007fff051eaebe18a3d918e0000000e2ff000100"}) 16:51:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x8, 0x3, 0x758, 0x9}, 0x533) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="a1eae2dd3ad8e4948339a7b049a17ab6fe9e3a937965323425cafb68d3540fedfb", 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)="59be0f1a31b9a58af59f76d7671be001f47ff96c2365ca5cfe391ae92c5c4dd0733bfcacbc7e66cf2bc5728a40d8c6ca10f7e4b7237d74570a0c350cc52dd3e6a654b1a088f57f58f29e2024188d62c27be82e8a265f88c3012572b3dca8fea9a903bacfefa872a96fd76168f420c491895f760ff4989d26a4393db45581273e5810fc011af4c2529ef3dda018b9d3edf9684a37e82df71f037d8cbf085b26245ce4ab7a684de3d0529e070ea34c17af070d21365198a5c25c2afb514bafce926ddb4eaa2bff0e23ef5e115457db722e49e1fb44e305671e", &(0x7f0000001300)="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", 0x2}, 0x20) 16:51:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u-er_id'}, 0x2c, {'group_id'}}) 16:51:34 executing program 0: clone(0x1013102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x801, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x12, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0x4000001}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000180)='maps\x00') syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xfcBj\xf2{\xcb\xb2\x80\x1e\xb4\xfd\xb4\x88\xc1\r\xe4?\xfd\xf1\x8cy\xcc\xb5\t4\x9c\xc5\\\x8f\xc8\xc8\x80\xd5&\x99\xe6\x16\x00\x00\x00\x00\x00\x00\x01\x01$1[\xb2m\xce\x17\xee0B\x85\x98R\xee\xe3\x14\xe5i\xe4hn\xa5\xe8\x0e.\xa6\xfeo\xb2\xe6h\xec\x91\xd9@\xc2\xf09\a\xbeA\xc90\xb7\xaeP^q\\V\xf1\x01\xcc\x94\xee9\xe3\x96\x9bB\xd9\xcd\xa6\xc4\xca[\v\n0\x9e\x9a\xfc\xcf\xfc_\x85\x0f\xe0\x803\x18.\x02\xd3+') 16:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 16:51:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x498b, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f0000000080)="484d38389baa92046c8c7fdb147b90d922b9fe5d97e4fdda10f050918095b9444c21384b657fd273f3b2c4a2d9bfa276b735ad386e02231bc7888ade2462b94aea5dc865f797abaccece43686096866bf901ef44fabb99da101ece6e471e4b3ca7653f4d6b7a2724f61bbe36960ed912713161cf999fa3a931640147bc8a000c26c2830fe11614c3e208255b2f681dfd3fdb331f32c85f7f9f8479c8a504e8d3c844bf377d296505cb46b1eeac1d7c0919dca09252880447edae12e2597c752135f72ba3a8df30848f787fb301c13135965ae27b8c361dd96131bcf1e781950ee1", 0x0}, 0x18) mknod(&(0x7f0000000240)='./file0\x00', 0x100, 0x9) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7fffffff, 0x20402) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04008cbed10100000000000c000b000000000c001473797a31000000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x20000810) timer_create(0x6, &(0x7f0000000180)={0x0, 0xc, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)=0x0) timer_delete(r3) 16:51:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u.er_id'}, 0x2c, {'group_id'}}) 16:51:34 executing program 2: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000980)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) 16:51:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x4, 0x7, 0x4, 0x5, 0x8, 0xffffffffffffffff, 0x8000}, 0xfffffe98) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xe080, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000040)={0x200, 0x15, 0x6b6f, 0x6e1b, "8e1bc374ce49dad4e630a87a31366e27ab3bd06ad1627f6ff73d4b54b40b3e8e"}) tee(r0, r0, 0x2ea0998f, 0x8) syz_execute_func(&(0x7f00000000c0)="0fa9e900000000c4417c50e266460fe18bf77f0000c46109f61747c1085e36420faef641da0a41d9f6ff8b0a000000") readahead(r0, 0xffffffff, 0xffffffff) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0xffdb) 16:51:34 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r1 = add_key(&(0x7f00000003c0)='dns_resolver\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)="104e5532bd96039f3ad93a249fdd50e7719b0deebffa3763da30108689e9e79b29f6725ec978f361a8f60b6748919ec83dd497ca92dadec49aed66f06b0a0f65007f48ce2aa02fcb424548eca28aa22e52c9c7967d058cde9b7b4ac77341d8471bf95f8fe40ee82c7f20f01dcc4e621f4deba60558e39d378b72f61ccc69b7cf69555e3cdece002b4a5c4367d35fe3f204a0c71946ff0dc4e644af3727651239e5cadb65a115686f3567ca78384a81091ee2aaf21847edfe6ecab3cfe2682a14b8", 0xc1, 0x0) keyctl$revoke(0x3, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0xfffffffffffffd, 0x4, 0x7, 0x8}, 0xffffffffffffff1d) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000180)) r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x401, 0x101000) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000000980)) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f0000000040)={0x101, 0x8bc, &(0x7f00000000c0)="76ffc70fa0093f6c788ba98168f96325cbbf3a94a43b66f6353e472c8e6f756b4405220fe18573a1a1be849ee64ec40f9f62a9da4ff386a156e1067067b2d3c1630e9344", &(0x7f0000000200)="2210d4681df4ba27eb75d32df11406e37549740611589f8a3a550b701bd8f30ca3c888405f7756564384e48eb6418826b291bad038a95846b6e90d11c6a1a552daa54c2d1f3bde0a4a05a7bfc3c13d21ac6a8784e208a4b8f991312731360e09c9505aca7beb96fa8f242e84f46a7b4f90330d11eeb2c72154adf6710cb3d53a87b71749925579c8b2717b0305c2d16c6c66f02eed516498ddc63a4d5fd719b31b37e0eb00ca8fb7ad022ae39cab9dea1322803a6916e3684caf69afebab79d703bef0630fd433", 0x44, 0xc7}) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000540)={"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"}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000300)=""/146) 16:51:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000001000"}, 0x1c) 16:51:35 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x3, 0x758, 0x80009, 0x0, r0}, 0x2c) 16:51:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u/er_id'}, 0x2c, {'group_id'}}) 16:51:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'bpq0\x00\x00\x06\xe0\xff\x00\x00\b\x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000240)) 16:51:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x20) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) 16:51:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) ioctl$void(r0, 0xc0045878) ioctl$int_in(r1, 0x5421, &(0x7f00000006c0)=0x10001) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x10000) 16:51:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x3, 0x758, 0x400000000009, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u0er_id'}, 0x2c, {'group_id'}}) 16:51:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x75c, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:35 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 16:51:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xa8000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f00000000c0)=""/210) 16:51:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5010, 0x0) 16:51:35 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000021800"}, 0x1c) 16:51:35 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000080)={[{0x2, 0x6fbd, 0x0, 0x8, 0x1, 0x2, 0xfff, 0x8121, 0x4f5, 0xffff, 0x2a, 0x1f8, 0xb6}, {0x1, 0xfffffffffffffff8, 0x0, 0xffff, 0x2a, 0x4, 0x9, 0x1f, 0x6, 0xf668, 0x4, 0x8001, 0x6}, {0xfff, 0x1, 0x5, 0x8, 0x80, 0x100000000, 0x7ff, 0xffff, 0x8, 0x80000001, 0x9, 0x1, 0x5}], 0xc1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000340)="427a5fb8c77b276d6744291f16b98dd83030e8b470b802df9ad032ec3579d5d0211f3c7c612f7fc8e776fa0e647857985db8bfb1164bb0ca04f667f407dcc0", 0x0}, 0xfffffd2b) r2 = dup2(r1, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000180)={0xa, 0x4, 0xfa00, {r3}}, 0xc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000002380)="bae2325f1a8a31e97fdff384be0442ded34080aadde6dd6a516c0aba17c7b6a6029fc27a70b799cea0a950d88f6a5b5b746535367826b1fda576c2a5", 0x3c) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ff0305000000040000007d329010"], &(0x7f0000000200)=0x12) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r4, 0x2, 0x30}, 0xc) 16:51:35 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uXer_id'}, 0x2c, {'group_id'}}) 16:51:35 executing program 2: nanosleep(&(0x7f0000000040), 0x0) 16:51:35 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp\x00') preadv(r1, &(0x7f0000000480), 0x1000000000000237, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x42a000, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="99868aae", @ANYRES16=r3, @ANYBLOB="000329bd7000ffdbdf25030000004000010008000300000000001c0002000800030009000000080004000300000008000400010000000800030020000000100001007564703a73797a3100000000"], 0x54}, 0x1, 0x0, 0x0, 0x41}, 0x81) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) 16:51:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) ioctl$void(0xffffffffffffffff, 0xc0045878) ioctl$int_in(r0, 0x5421, &(0x7f00000006c0)=0x10001) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r0, r1, 0x0, 0x10000) 16:51:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSETATTR(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) dup2(r1, r0) 16:51:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'ucer_id'}, 0x2c, {'group_id'}}) 16:51:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:51:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040), 0x0}, 0xffffffffffffff3f) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2000, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000002c0)) ioctl$CAPI_GET_PROFILE(r1, 0xc0404309, &(0x7f0000000080)=0x100000000) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r1, 0xfa, 0x2, "88d382f0a7832e7d88593184da5acb3c712a8579237fc1e5f5d3d5d4a4eb517118d9562557e2e122a59c00816e3ce9e1335dff779e987dcf319edd082cd9d8e4eaa9c5c3fdd409e3fa434bdec048c8346c6e1bb48e0954d151638c33039a4b177ecd6c5cf63309ecc79e2427d897df8e1fc9c83409b3aa"}) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000300)=""/4096) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)={r2, 0x6, 0x75, "0282e401ff80ff1fbad3e32f61e3003adc56450cfc982c43c95174e806c31de788719b2d6a0ccc3b942eb10cca13680de598f74f994a228ebf704dcfa640f44bc6affbc015d107712f34a7c8710577eff6739e1f01763eba45cff6deb71b5484dad0faeba2f69b46861a38637582eb15df6c2fb78c"}, 0x7d) 16:51:36 executing program 2: sched_setaffinity(0x0, 0x63, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) getuid() getegid() 16:51:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fallocate(r0, 0x11, 0x0, 0xc00000) 16:51:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9, 0xffffffffffffffff}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = shmget(0x0, 0x4000, 0x78000448, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) 16:51:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uder_id'}, 0x2c, {'group_id'}}) 16:51:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00\xf8\x03\x00\xfc\xff\xff\xff\xff', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) syz_emit_ethernet(0x56, &(0x7f0000000080)={@random="06c24eed2ca2", @broadcast, [], {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "9f18048d7b5f50ea992585fec78f8777b060cb78cfe1301ea51dd4dbf758e7b01efa7fc9a995278001114819668e216fd0621e9eca956ee11856de008f4bf1aa"}}}}, 0x0) 16:51:36 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7fff, 0x800) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x2, 0x4, 0x4, 0x7, 0xd, 0xffff, 0x6, 0x7, 0xe085, 0x3ff, 0x6, 0x1}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) 16:51:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x10000, 0xff, 0xab, 0x3}, {0x200000020, 0x50, 0x3f, 0x2}, {0x81, 0x40, 0xf7fffffffffffffe, 0x1}, {0x4, 0x2, 0xfffffffffffffffb, 0x4002}, {0x6, 0x1, 0x396, 0x4}, {0x7f, 0x3, 0x0, 0xa9b5}]}, 0x10) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uier_id'}, 0x2c, {'group_id'}}) 16:51:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="0f01be0f00ba4100b083ee66b8070000000f23c80f21f86635000030000f23f8f2f265660f350f001766b94c0b000066b89842000066ba000000000f30fabad10466b80000c0fe66ef0f217a260fe71b", 0x50}], 0x1, 0x51, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:51:37 executing program 2: request_key(&(0x7f00000002c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000001fee)='R\trust\xe3cusgrVex:De', 0x0) 16:51:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f00000000c0)={0xfd, 0x3}) 16:51:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000070fbda333200"}, 0x1c) 16:51:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uler_id'}, 0x2c, {'group_id'}}) 16:51:37 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 16:51:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x6d09, 0x40040) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f00000001c0)=0xfffffffffffffe63) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={r2, 0x101}, &(0x7f0000000240)=0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000340)={0x9, {{0xa, 0xe22, 0x5, @empty, 0x6}}, 0x1, 0x0, [{{0xa, 0x4e21, 0x9667, @empty, 0xffffffff}}, {{0xa, 0x4e22, 0x6, @mcast1, 0x80}}, {{0xa, 0x204e24, 0x2, @mcast1, 0x6}}]}, 0xffffffffffffff5a) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_DEASSIGN_DEV_IRQ(r3, 0x4040ae75, &(0x7f0000000100)={0x20, 0x3, 0x7, 0x200}) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000580)={0xfffffffffffffffd, 0xffffffffffff0000, 0xaf7a, 0x4}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000300)=0x1) openat$mixer(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/mixer\x00', 0x80, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x604041, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r4, 0x770a, 0x0) setsockopt$sock_int(r4, 0x1, 0x3f, &(0x7f0000000080)=0x8, 0x4) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x0, 0x0) 16:51:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:51:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(r2, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="0f01be0f00ba4100b083ee66b8070000000f23c80f21f86635000030000f23f8f2f265660f350f001766b94c0b000066b89842000066ba000000000f30fabad10466b80000c0fe66ef0f217a260fe71b", 0x50}], 0x1, 0x51, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 16:51:37 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000100)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xc, r2}) 16:51:37 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uoer_id'}, 0x2c, {'group_id'}}) 16:51:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$void(r0, 0xc0045878) 16:51:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000007c0), 0x0}, 0xffffffffffffff45) 16:51:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:51:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uper_id'}, 0x2c, {'group_id'}}) 16:51:38 executing program 0: bind$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/66) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0xaf7, 0x0, 0x0) 16:51:38 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x561001, 0x0) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000100)={0xb, 0x3, 0x0, {0x800000000fff, 0x1ff, 0x1, 0x101}}) 16:51:38 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7f, 0x8100) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000080)={0x1c, "58d8e40b7d28e868305b84eaeeab3637918bb533ff1185c0b4ef945f6e2c7ac4", 0x3, 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:38 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x100, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000000c0)=0xfffffffffffffec3, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r1, 0x0, 0x0, 0x4}, 0x20) socket$kcm(0x29, 0x7, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000100)={0x8000, {{0xa, 0x4e20, 0x25, @mcast2, 0x4}}}, 0x88) 16:51:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 16:51:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uuer_id'}, 0x2c, {'group_id'}}) 16:51:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x78000, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) clock_gettime(0x4, &(0x7f0000000040)={0x0, 0x0}) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000240)={0xe, 0x2aa, {0x0, 0x0, 0x9, {0x5, 0x3}, {0x565, 0x17d}, @period={0x5f, 0x7, 0xffffffff, 0x5, 0x7, {0x2, 0x0, 0x7, 0x401}, 0x2, &(0x7f0000000180)=[0x8, 0x400]}}, {0x55, 0x3b, 0x2, {0x0, 0x9}, {0x10001, 0x8}, @period={0x5a, 0x4cdc, 0x860b, 0x3, 0x1, {0x1, 0x800, 0xf7b, 0x86}, 0x2, &(0x7f00000001c0)=[0x2, 0x88]}}}) syz_emit_ethernet(0x82, &(0x7f0000000500)={@random="b8e38a61f362", @empty, [{[{0x9100, 0x4, 0x3, 0x3}], {0x8100, 0x400, 0x9, 0x2}}], {@x25={0x805, {0x3, 0x7, 0x1f, "06d4e2b1535b67f8dd63cb7301088396a74b0f27f9ccc226640dde1e68e54e0089f505b93688139022fa528e4ef1a7767e28bd17ee458c0cd56534d0e6220c8897df4eaabdb659ea15fcc6c15865091e23207ca01e4b3038a33bd6a56c9ac43b78ef73ec2ddf2037c6"}}}}, &(0x7f00000005c0)={0x1, 0x4, [0xbd0, 0xa37, 0x4b, 0x490]}) fcntl$setsig(r1, 0xa, 0x15) timerfd_settime(r1, 0x1, &(0x7f0000000080)={{}, {r2, r3+30000000}}, &(0x7f0000000100)) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f00000002c0)="166651abb7f3734760a4673dfe84927fdc5e5fbeaa1e50e53672192ee65a145f96281652406e7a13c2e53fa7", &(0x7f0000000300)=""/167}, 0x18) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0xb5, 0x4, 0x8001, "d9f5573cdbfac9648072aa7d697e2e6c", "ac77bc533dea760a38aa30f9e3b8da07c2a7731946bb2ba0fd29a17e87ff4a066e3f987900bedd5adcc39e7de3be769d264a73400e4f1e79246f7c72539946b5b096e178c1eed42a51bedb15ae73d0319d1fbc25c697c2a4bae9bf9843c19f9d8c87bb2ecee452bbd8a685909b423d5182d9cb6693eea5a5560c4f13db607c022feee56f01bcb14c1ae9f40af5627f92efbc8f4f0d91838c34632b8c119b118b"}, 0xb5, 0x3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000180), 0x0}, 0x18) 16:51:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) dup2(r1, r2) 16:51:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10480, 0x0) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 16:51:38 executing program 0: 16:51:38 executing program 0: 16:51:38 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="c07c62101d9fcad699c71a42c9a9e91f6cccd4317eab9a2ac06a042ed67a688fc3daffcdba983ceaa840b5d7ad166e4c4f336a63db936352a25528ecf31fbd66", 0x40, 0x4000000, &(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) recvfrom$inet6(r0, &(0x7f0000000100)=""/253, 0xfd, 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:38 executing program 2: 16:51:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10001, 0x200000) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x80, 0x3, 0x353}}, 0x14) 16:51:38 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'uxer_id'}, 0x2c, {'group_id'}}) 16:51:38 executing program 0: 16:51:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x1b00, 0x1) 16:51:39 executing program 2: 16:51:39 executing program 0: 16:51:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040)="ce961e3ca7746953b514fd3ac10862b48db526bcf7bfc1caa90bd4f08bbc3c4d25943b0a79ef401fec2d34fe608864b4e2147a5c589be7afb0aa4eb840239a0732dc240600000000000000c3250530634a9b01ef5be61e89", 0x0}, 0x18) 16:51:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 16:51:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'us%r_id'}, 0x2c, {'group_id'}}) 16:51:39 executing program 2: 16:51:39 executing program 0: 16:51:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x103000, 0x0) ioctl$VT_RELDISP(r1, 0x5605) 16:51:39 executing program 2: 16:51:39 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'use%_id'}, 0x2c, {'group_id'}}) 16:51:39 executing program 0: 16:51:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) epoll_create(0x7d) [ 825.308778][T16809] QAT: Invalid ioctl 16:51:39 executing program 2: 16:51:39 executing program 0: 16:51:39 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x0, 0x0) utimensat(r0, 0x0, &(0x7f0000000100)={{}, {0x0, 0x7530}}, 0x0) 16:51:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000024000"}, 0x1c) 16:51:40 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0xffffffffffffffcf) write$P9_RXATTRWALK(r0, &(0x7f0000000000)={0xf, 0x1f, 0x2, 0x4}, 0xf) syncfs(r0) 16:51:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200801, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)={0x0, @reserved}) 16:51:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user^id'}, 0x2c, {'group_id'}}) 16:51:40 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000370000000071100000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x0, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r3, 0x3}, 0x48) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f0000000380)='\x00', 0x1, 0x1) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(r4, 0x0, 0xfffffe3e) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000040)={0x18b5, 0xcd, 0x5, 0x42fc}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @local}, 0x80000001}}, [0x5, 0xbcc3, 0x70, 0xe8, 0x2, 0x80000001, 0x0, 0x0, 0x2, 0x0, 0x141, 0x101, 0x14, 0xdbad, 0x9]}, &(0x7f00000004c0)=0x100) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000240)='syz', 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x4e, "b8ce047e66f7092676dc9943525c467753ee366f89e0096b31dea6c8b45b4324e15b81c04980215ff4194ddf5c93cb10b0ec0b378e58ac17e628f373d801d639dc969793dec18349f96431bd5515"}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r0, 0x8, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000840}, 0x400c080) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmmsg(r5, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:40 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0xc0505405, &(0x7f0000000080)={{0x0, 0x2}}) 16:51:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x7}, 0x2c) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000000, 0x80200) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000180)={0x0, 0x6, 0x4, [], &(0x7f0000000140)=0x6}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f00000000c0)) 16:51:40 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x2, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 16:51:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score_adj\x00') write$apparmor_current(r1, &(0x7f0000000080)=@profile={'permprofile ', '\x00'}, 0xd) name_to_handle_at(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x57, 0x5, "ab395659ab7d7cc0040e4b82b4f7bee604781912eb485924d6c6c90c6462371268d254733d814843539aa8c001fd088891abdfa1b076124617a554fa76ed5dd55738fd50f8a800690cfb5c2e23a255"}, &(0x7f0000000180), 0x1400) 16:51:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user`id'}, 0x2c, {'group_id'}}) 16:51:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:40 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x3, 0x0) r1 = gettid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=r1) r2 = open(&(0x7f0000000100)='./file0\x00', 0x4e080, 0xc0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) socket$isdn_base(0x22, 0x3, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f00000000c0)) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000480)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r3, &(0x7f0000000300)="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", 0x0}, 0x18) 16:51:40 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x400001, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000140)=0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 16:51:40 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_%d'}, 0x2c, {'group_id'}}) 16:51:40 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000370000000071100000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x0, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r3, 0x3}, 0x48) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f0000000380)='\x00', 0x1, 0x1) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(r4, 0x0, 0xfffffe3e) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000040)={0x18b5, 0xcd, 0x5, 0x42fc}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @local}, 0x80000001}}, [0x5, 0xbcc3, 0x70, 0xe8, 0x2, 0x80000001, 0x0, 0x0, 0x2, 0x0, 0x141, 0x101, 0x14, 0xdbad, 0x9]}, &(0x7f00000004c0)=0x100) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000240)='syz', 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x4e, "b8ce047e66f7092676dc9943525c467753ee366f89e0096b31dea6c8b45b4324e15b81c04980215ff4194ddf5c93cb10b0ec0b378e58ac17e628f373d801d639dc969793dec18349f96431bd5515"}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r0, 0x8, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000840}, 0x400c080) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmmsg(r5, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x15) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2200, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x2000c800}, 0x4) 16:51:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_iD'}, 0x2c, {'group_id'}}) 16:51:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x2, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 16:51:41 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/dlm-control\x00', 0x111000, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000001a40)=0x2, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x9, 0x4, 0x7, 0x8}, 0x2c) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000100)=0x6e) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000140)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x600180, 0x0) accept4(r3, &(0x7f0000000240)=@nl, &(0x7f00000002c0)=0x80, 0x80000) timer_create(0x5, &(0x7f0000000380)={0x0, 0x1c, 0x2}, &(0x7f0000000340)=0x0) timer_delete(r4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x15) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000200)={{0x7, 0x8000, 0x1, 0x1000, 0x7, 0x2}, 0x1, 0x0, 0x66}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000000c0)={r1, 0x0, 0x0}, 0x20) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000300)=0x5) r5 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mouse#\x00', 0x9, 0x888001) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) 16:51:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/68) 16:51:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_i\x90'}, 0x2c, {'group_id'}}) 16:51:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffff8d00"}, 0x1c) 16:51:41 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) setsockopt$inet_dccp_buf(r0, 0x21, 0x2, &(0x7f00000000c0)="c1d1096e2ad5f8093fb12cf194ac21e8e46c651fbd7e193cfe346d2adfa3bd741793cb8c81bb012af76e1f59fd1315d70220deb196af33882781fc8d404c8bdc4e58cc31397a7666d0a819f1123e5414f9839dd573928b9541d05d43f27062fb2a969c6da7924cd7e0f970c336fb5e0aab891de7378d70efd69d395eb499b78a4784ac4fbbf707affccdc85c4168071cc731700dffb77917dd971dd8303dad5aa1d7b7202fa86211841a443218555350360c5edb8046928feb1dfa568f07dac20dff4fad8d5b6a1b37", 0xc9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f0000000040)="a70705e473ecd3a138fd60c9fd79d8a20c9d6d9669c16b6a1a3c", 0x0}, 0x359) openat$vimc0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video0\x00', 0x2, 0x0) 16:51:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\x00\x00\x00', 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) 16:51:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7e, 0xc0380) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r2, 0x8}, 0x8) 16:51:41 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x156) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000370000000071100000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r1, 0x401) socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000040)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x0, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], r3, 0x3}, 0x48) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$zero(0xffffffffffffff9c, 0x0, 0x11b400, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPIN\x00', &(0x7f0000000380)='\x00', 0x1, 0x1) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$unix(r4, 0x0, 0xfffffe3e) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000040)={0x18b5, 0xcd, 0x5, 0x42fc}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @local}, 0x80000001}}, [0x5, 0xbcc3, 0x70, 0xe8, 0x2, 0x80000001, 0x0, 0x0, 0x2, 0x0, 0x141, 0x101, 0x14, 0xdbad, 0x9]}, &(0x7f00000004c0)=0x100) request_key(&(0x7f0000000200)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000240)='syz', 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x4e, "b8ce047e66f7092676dc9943525c467753ee366f89e0096b31dea6c8b45b4324e15b81c04980215ff4194ddf5c93cb10b0ec0b378e58ac17e628f373d801d639dc969793dec18349f96431bd5515"}, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r0, 0x8, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000840}, 0x400c080) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) unshare(0x8020000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020700001000000000000000000000000800120000000100000000000000000006000000000000000000000000000200e00040e0ff00000020000000000000000000ada8008004000000200000000000030006000000000002000080ac14ffbbf00000000000000003000500000000000200423b1d632bd7b8200000000000c7"], 0x80}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmmsg(r5, &(0x7f0000000180), 0x32bc45944b084a6, 0x0) 16:51:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x25}, 0x2c, {'group_id'}}) 16:51:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$setflags(r1, 0x2, 0x1) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x3ab) 16:51:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x4, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 16:51:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x90800, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') 16:51:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x402000) open(&(0x7f0000000040)='./file0\x00', 0x2141443, 0x0) acct(&(0x7f0000000000)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f00000000c0)={0x800, 0x1, 0x1, 0x2, 0x13, 0x4fe, 0xe905, 0xe34, 0x5, 0x9, 0x1, 0x7}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{0xa, 0x40000, 0x0, @loopback}, {0xa, 0x1, 0x0, @dev}}}, 0x48) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$media(0x0, 0x5c, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000480), 0x0) 16:51:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffff9100"}, 0x1c) 16:51:41 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x25, {'group_id'}}) 16:51:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0, 0x800000000}, 0xfffffffffffffedf) 16:51:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8, 0xffffffffffffffff, 0xfffffffffffffffe}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) accept4$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14, 0x800) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@ipv4={[], [], @local}, @remote, @empty, 0x1, 0x202, 0x1, 0x100, 0x9, 0x1, r2}) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000200)={"136a4577909ea263ee825e5acce242a2d3ddd4a1653e482c46ccf7cc09a9d5da4719deae888f0f211f78828060b29bd96a666b03a718e520311dd3431b3b4fbd52985780640de613c5a61669766577a4a2ed4d5be4f57419fe924a4a84fd16f4736c6724dcd164f06f45b465835339d8ec5b708935d4b324269cdddd57a7e68b6c31b8474954241a1ac7acd40c8498f67329904960830cc07280e4b824f4a2ddd9e8beb8a52929653ec2737157b327ae1e7aabd9a8cb1b8310e0e3246cef64a99bb1c584b7a4e0aae35f6c8d4a412c52b72471fed0a160c49bacad99a8ef92f97cfe7e35a6865e7c8a3b1437ae7412d26250b566d24a029f4258768dbea9978c00a36ec7a26860c6d212f49e6ac5e73cce4c775e5afe3be232f755c518b65e72970d0d10b53c1c51d32fa1315f7b2643c53942e3587a971fb5b3f7ae3821d7e2a675342a6009831b0c8813c52f13cf164e10f242e6993a463315aa353815477f915b66db98472276b51b101d3e7cd8b9e62e9688c0b548ecdfeb65d0f63316c4f83d97c38b506838697343a3f3d1377c4295072bfe92d31bae67e1db298a76db15f375143637d3e428779673d6fc5365f9ab7365d46abe3055fa3f9e8be5e414db16d8bf33f979624705065bc7ca51e7a194d77fc83d859506f40fa9b1aa0a5ff0edf3b291e1c4c9a7cca7200484790ac55dcd902b1e5c10b0ace299828d0a1b1d1e7e3003dce9fa79d5d66e9288a36e17bdabb5bcef6ca79786aff91e044deee27f80650fcb89fd2e7ff5951b0306d0b217961bfa595dc6b3a725028973f9fe76689dec47a14748f95a6c03a5505b1b389fbc511d89dabc393b5c18553f83e380948782e088fd28c9926f76187ab71b5d66fdcc19e1746842ade71ac614571fd3c5dc1e17cfd76765626cc682910d802a64413fdc70719a553cb75edf428e89159a156b39e4a699c1c5d05740a12f18c8634f5a0aab50d17773c21b71edf0c6d260cf5036395b2d750a60c2f1c5bdd16f4ca00e93e71d9ffe25e35e02ae55bd1959db20d4ed57a05db3c81c2d49a07d89813653369da2364a8c85cb15a76152f3831672b955839ad3231d394da93b2895c8f726fc1f60fada5cfa425ef7313f1fdc42625a9d9a4f070313fa3a4a560513537e50076f8f25a9db189e84adfd82cf304c3ca258d5e802c8dfd4779b455c4e2ccf70374a4089a16fe72aad3ddc5cbfa7665fba7e4faccf2ed9c6dd3d7b522ff8f2e2801b6a2f1f1e57882c77ed4f286a76b20936324798e4df4696ed571c5915a93599aeef8d1b5d10a4e75973b3f55f8ea2485f8c7e226902e671ae58dd9a08dcfc05732bdaae6bfa086c8820c1742f3ee8a12c2106ed889000974aa7d7f568e88f067f253a19dbda56f6078ab60f070f2b5ffc20871341c9d62f3a2a98532084dab3a70806083e8ef1a7a325b6"}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x2141443, 0x0) acct(&(0x7f0000000000)='./file0\x00') acct(0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x100, 0x0) 16:51:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2, 0x0) write$rfkill(r1, &(0x7f00000000c0)={0x0, 0x0, 0x2}, 0x8) 16:51:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000001cec819600"}, 0x1c) 16:51:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'%roup_id'}}) 16:51:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000040)="096f26c113653ce102fe4f931f2b55859f6c34753cbfb5e35bdc38939875bf9356e80ef7a9d8f1b26953c7fd977589f37cd31ade07ce9ac38afec84dbe", 0x3d}, {&(0x7f0000000080)}, {&(0x7f00000000c0)="f5af911a7229f3bc6aa6961e9c59023247a6101315c0bc654d37c6e56b5fd98cdd22ede094c2199feaaff6221f620d1c497c25ea33a10ab4f124deaf13262f67482f5be04d970fc53966f05ae0b0dbc2567a66fe15", 0x55}, {&(0x7f0000000300)="75aedbab2d59d770854119a9e7eabbf5f117ed2cba5f5194ccb17e57ff6efa250b628f5ead82d32835ac505643e11535fa38635a80beb8938b1eacca22d1d2945c269827c3c58138c11c0df69a373f4edab72ad29fe9c8849f56282be458bf4b0ce65867cf0cc3df618af9aa5326092a29e47286cf4aa6ddbc2bd4d0a7fc3fe09d390a45cfee8c1221c7b719ca08355a5c62da1e9067f581cf5f0450b17c2b25d16cc24b82fcbc8546d09c7bbcab6f6a2e6c7cd1d608fc7ac2208e35d7e7408688f728521fc6517152a0a32428ecc2dc43ffcd7519f4875b886a62396b7011726c1be970988533b6363b8e643f489b8d52c697703ba867ffc48c21cb4348c1a562a70d83a7b891d5331ab1625c1f78680a5ce6691c1d3075aae3f6b26071313fa241d2e5346a5b1f5c29f3e75e1c362b95186247d8c4606a450edd8e039d83edec1b670bbd9142d2d7bd37011d7308dff337a7deb952b19f3318ab14d05d453f9e8744853cba2122e540a85fef6b03dbf3da135c6b4b8f3a2578b42f83350b3a6382844d2ac7edb7158bf09f6b63ef1b2d071627098478bd4215821a36115ce2b02f9d1cd6869bf3b4af740cc1243977b0ab4627075c78d3921d828a87860b5663dc99badb462ebe8d275d7037d637d4a6b34dadf18cfbc6ae1256877f04255674b9be61cb01027f05615c15a3bf380e0ae2a5dcec6ca012be05d652ef3e11e94ba684636e81fd5daf56a794f536042c4cf8c5a9ddaaebd97b432dc6221885c5a0d04152c8f6aa0d9797c48a747a111cef9864f1484287a59b8213268968d0275074c8756e072ba99aa0ee2a251363bc53dd7648bc9954994d3ebb4ccefc607d8dcee3d43891c337e14cc292fe8c5337568bb4fee58e4eedd46397a8cde9910f3e8239c0df3e73c4e776cef711996a0673c6dc050ce25a78d5c25613703ef84b42c62edaec8bbd3ad94f0b1d5176603699da023c069f0a3a49dcda58648070455d08121633ca3bd95e8cc8d5b091b0353ad66268048123eae962f8056c76b6d50db0f91c9c7d9f1d8e662b208fb55f82b84fd74ec8c183d2df09b10d92cee40a7acc2d28d9a8f1e7e25a8192fd5ea83f55c8775b6b6bfbbf7e3d8b7f7c36bd8c23744ae5702e1b3e7a1f6756b3e5f5c8c56e465a4650513378fad130fa85ed7e37d908fc777bf8bee129e7536f24f623eee8e5041ed507f036bc6c3272e6b8c56360611d014e6e87b4fea0186c46656bd97437fff268066d1bd7ff220330cbf6782870e86941adab16c74bf6c404152728a0ca128540a9b9d2c404d29594865721dbd29a974eb532350cc37486781deb83e9a5e72c9e2af1538464dc7b97b5febedd5f3ff727c2ef7af23cc9c4685c632071657d61c205615212bb4b0bbccc13b7bf238d30f1393976da0164695b92e4dc24d702a1143be13211806232ec970fb2556baed463b4378153167332cb4694b5c1f43584527c840565e4091809b50c1bef8252a29a2988e7dcadc355b40a634071223c716cf5ca50d0a7e75ad93b6a8283cf115b49cf5794d51075ef3394f760dcb6f569188db6c3b87bd691800e41c9734b53851b33b647dd506168771205be280a3ec8ed28eacbe1c5c331f10c053c1ac600f69c769e05df61749d154cbb8fdc1ab92af1e6482e2aeed45f952b669bf016381ab1e94359c1ee2ae6f850d93498248f33ebe80270f1589271e7f6abba67bede78f0d50c3d15176368cfce0b8a73dc45cd46159653129a09b255779ae65a3244bcd587ecd72109cde476c23fda94c4306f8b6a0efbcced71a261a7d5ab0afec38e5f4e14313e2ed1d8922331eab491714edf9efd145bab7bf4a211a49dc8d72700bf2bdb10cd3b959ac93ff0e27e5886d4c68413eadfe21a3a0b891813398ebfba108983307bf1379cb95bf4ba59d297d2df1cae6046e3a244d33d0fc48e048f9e5aff7011444a79353ac0640940cfb7bf80dbb2f4d25ccd982504367a090d7b6de32ba30a323878a927bad27382750d5047cfef98d6105cfa8a93849497d9913423afc872157e5df955b81a4e80f5340e21a21fffc5f361119ebeb43a96b525dea2729c01110ac5d8d652cf1ff266b1477f5ef0e33d371b9334c54633fb5c46867bf12b5e9e095f0ec87c9f3bb06cb884658e5ab0dcf49f616bcde41bad2f5b7e25be9f1bbf4174eabf4d2bbf50f12b61b950a199951baa688e90e10e4af4889911ce18f050256fe350053216024639e905207eedcc18465166ddf7af060b89780dfffaeeeb444b76ccf0653cea3c2fd3f5f2bc95b0de232334c90d492508a7fb87169e0176b9156e8b68f3d0b8c389e11bde04d5f54e6383ea47dc538b937151e909c38ea295b281a38945a89d457fe762ae7b74b11a9351e4913c554394d156209f63c4a84cff8f8e82f3614a8d42a9c1da7280eeec10de0797818d9ad47a5042d8e9fd50275cd924a47ddd44d47d13078c3d7ec6d43bb6e5dc8feae6f25c4dbe1d63d044b1d430e0f054234db487376cc320564c7368f4392e179051e9866a6ea9e81b9f07da97b244017c3f3d624767282e917351b25be06b07937d2f6a1b37c58eb6b1f88479369a1b55eb8fc2ceaea7212b8b5ad8c55bebeb8c4947020f70f1f89ff799fdbc14a6b78b74367b14e21cfbc7db5de6ac1ea29b6f3aaeca8f220a23fbc382b7b64665b3c2db97578699842bfaadf2aeb8802f05bba8dfc3480df6eed1118ae82dc2da295aac126737d6fcf4a370bccfbe0abb9c7f365cff8f71e6def765e8b74dadd84b9628da66b073ceffa9a74b90d3cc9d468265da2c9da932ebb7cb68214b9f6ba1c25d5193fb2cf4ccbb5a1dc082de5b1f86eabf41613eaa9770b63f7d6270b750125ff343a41dadb53ae0a0ab5fc36484ecfcdfe8aae6353636d4aa6dbead547d988586f7a80c8ea9ae0f00187956667e9732651b05b903293f9c382a88aeb08bf9f92e76ea7927a8cbeecc8cb93f7dcd16b132153dc0da06c034ea68a041fb269cf801cb689ecba1d59496fa6889f9c165bbd0b5a0d38237ba085048a6f94a61ec61661083dfc4a4b9166eeb45472874fdb664316855b2757b1f1dd5ffbdb2460801e1c9c8698be4bbea57dc4e0aba8a3066358b7537d1eae0e7bc339cae6ff887bb6630f5822e7b8fd5890beb16ba22719ed0d6edc711d07663bdb91b3bc06eff45eebb477bad08e0062eeb0c927bbf2d55cea37c04ef836e510c9f630b2303bccb69a7a410ba1e488a499162f4ad0d93a6304a634481715e86e0303ae1b7c6cf7a3f89aa8559b52422e48874562ee1176c00d63a80f58bfad66cda3c1dd343c36cb0782292f781ef14d7ef0f653d9a71ec567c3407ddf8ed7cc3fc6ca993a01bca38698201e13052339ddfa2cf598b77857f6b3a1186e641dc6e2eadad8b7601a21e171cc80114ab0bbbab291101ddde1bcc8147496e7b55b19be722df627d608c7933df1077dd00d5f7e231eaa93e904f03f13aba612bdb54e714f0f5c246fe67e14a6e913298c63ecd69513e49df333686f55200a6293f118d405251ca7dfe09f6577072f20b7d681275394b407b16de0937c93e6a7f196bee5baee6bcd66c40bd067979f992f32b21caa91fa7a23919cbf9188beeb1843141963e3b4043366e0de1be32432b19a917b3fdd727392ba9a7dc32dd7011808c442f27e0f7f13e6900fb032e4cb1e51896eeb8973d592e82ae12b6cd2967382e913a60c7b54ffa652ffb9ae1bd17d88d2822c0d12e809dfbb3e350b7371704fda15b8cf64df211fe7d2778c8bb35f641f4e785132c23a966be23d120f141b0e436445ada9dfad70d92b6fb6ff1396a223e54279fad782e92a1b6f4b9163711eb3e98242c104637911a6c8f055c37bf724e509eeab62701cf1c821df1c9eca1168674639ba0364099460ad517a45f40adfdd2877ac5c733623a5eac22e86d2a9a3e1133eb92487df7a8d2a05522256a70473d666870ec3da2cc333e4a63d979b05ebe7919172f5e9f49c17c47067e870d3c2dadf95eb2e20644fba8cf02ba8fd66233eebd45267f1a65ee57e0e55117af7850c2a3a025470d0d7d00f2b1bb03f2b7fafadc9bf925982a532270eb72f281c0f42f0dd448f62bb092401b531b9db8bd62037897fdfbdc845e68aa6d5c3ae98516b2bbd8645e11d5b7a86e54b50b631b31055957ef9059dee1b5c8a2e15588d345a998740ee62e8ac6bdd868deb62d1fabfdbb40c94367fb23b8d5ea696bafcae0677db888ccb6fd557e16ec9d132ea1fcfd2a60b7c91fe6394a1f0674f85cc2b08664787e510c1b8e534393fa11db951fb2eaf72654ad951a6e2300e843217d70fcdd2a229781e8e38c0280fe7a5185383228af6f541eec3ac570e32a174719affcc3f84b65e5959cc122704690144e8f7e77765cbcd85db46e9adb8023a14c9c7e2f395b0588522f2dc260febd060b27377e7a0c65051486f6f985a5e624bc6019a27ed412f19143de11226fa33418fe2f70510ab6030c6ec583476cc4b56cba3a2bb2c3a7a2b8b73bd8bbede87f19adf6a9ad17ce5f0dd8e6f41f3acda152d4c943b385723e6b95aede2fda10e7c3340d5ee86f74162a24a87af0416cdf50e07c2b3bdec4f74a4cdbf0edef660c0a57d7b46fca874ade761d394be3de0816260f2a4d091e8842b75a3c60b7582ea01d8a235f4f8ce3c316fe447dfd1d4f30bcbf5f6226b8f5638ad4855b12d482b9a19d0c2361b4b2ed78e8e8394070c9a22322e950b03e71a00a2c8e5d85419ebc7d4a9cf938e4acef6ab36682b1f48de7d509443eaabff73609d75608051b62b27f871177b653ae5af2844fe8ca6e05437190a86bb7ae313852d15ad3ff5544e2367931d1dd745cb30d8ae58faa7de061c5f78d233410fbffb53dc73ed64326e85a78805231de0d901098202ad39d61d0db5197cef425dbdc0ecb98af222c859b4cb0643cd81e9c918e069951225bd0dbf341e1a7de9a24a96a40fc958efa29425458142936ba4955b2f6484c28d8ec22bc13b019cedc5c0286e472ef5646fa3a1b806719dd63fd69f87ffc1db53f2b744ab5ff32457e16aa81ef6723342a3cfb2d77ff28a68db4191c5fbeeec7c19e63211e5695f018b2086b8ed5854d6e12c5a04d83a11acf24abeb2a320255e1044f42e1c31b4b45ff3a42ae4661938d8aad99bf016a92575411a52dd83f4c2798d2ae5cb2330f373c91e6f5054d621cf43d769a3f17bfd69b6cfdc2b584ea476ff3dff9727c36c20af87530fb2b1fbfcb6fe03c6eeadf0c6eaf6d4f184762788fc26789b1dc58b9303cbed3f81ee7d9a9880759cba434f93962d208503d9647e9e5b5ee2f394fcaafdf6f9f2909f45673cf0a6493ec5de2a7926eee8768594366e47c7f0ad8d0d87300908bb13635a7f19a1966c0c7e82eea34e87b03acbcf798ce035f33ed8b1cce9217d7afd62e9d035f81a89d6ea65ba83b52fbdfa88f137b1c7859b3dded9dd800f50c4dad55d3ccf63ad68e201c3af62826a5d9b964558439d4ca9b8dbfa212dc05278ae95a838221d9664013a82e081639872b447ee3bd476cf922272388bbdfe62a89ea13cee13970bb8013e8c224b57ace2e45be2bbe17605feaef553076a6988b1f3ac58903ec3e7cf2ab60e2b274abdbb2ac20ada6a178247a18a9d7437887c4581e62c42a0e4a78016730061423c10dbbc38dec1d1b18afc5825365318c342ddb5093da291f5fe6bf0cadab7dbd69542ed486d4b739c69887c7fd59e15cd0352c5eac802bc15cfdd23bb7de698499b0b685d49677cdebb135b5ec", 0x1000}, {&(0x7f0000000140)="00802b26d94293e47f679b0b0b28ae5d99b128d132fe78f7a1634f7b09ca05127c4e916ea2b955cf748c82ea9836f28bf63d58758641f6890aebf05dfd793c7d0d98942fff5e8fa0b93ce378f0bc0b0a5c0145402986f8ccd6d9988691bfd98a06a0aa5f6fbbdeebbf6c22c9b5d7a2d73ea51950acb2310358c651702b9aca904350547bb4d1f15f64e30004be7adb62d0cb8e751cc9d846ce02983df0601df423f23d453aaa5a4060798f0d6ffee9e9a55f03a446fb97d96bfcac119f6c98fa18c65b1ee0812a93b557c78458efd12f4ee9b1c69703ce0918d163f6cfb8a4f2ed64804e9352439775348267d46b084face87d8ed63b4392", 0xf8}, {&(0x7f0000001300)="2af5e81b275792cf9d5e7d1e7f26b65569ae2626dd0051bec16dc22749d3aea0ebd6bb071dfcc3ba1c27a5cd835b354fad5eb05c730004b7ebb1089ed24f7f6553c30c378316a8748d1c78db10f0cbb2d88ce7ae25f811455127982d93ffec296f95bf4f23e10bd873de2de6797573473fe23afa2b86e6493a73ead75644724a0f668dd797e38b536e2478a96cdae7e66eab22c3f0351d09b8d1390ac6290070c0a6d057e18a5bb4e8f99febb2ac0e16406cf977577c4e36bb29f8f1c63a83a1b2952addcf132f4a167227340795ec1094d4c32112c9470c1a", 0xd9}, {&(0x7f0000001400)="8af39f471cb5cf956abb6e24774f9af00d850b7cc4d9812c4fcea011a0fc3af3bcbcf04d2c3e17e490130407e053014a8d0b4c750931090bdd3513555c8a7b98372eeb39a8cfe0b25a0adba1529b97e1873092ba4e97537971722b9741f1dfdf941ce2fc4d063f0d2da82d62646cddc9fbcf21bb1c322c90d034cc2d48239345c7c125809f9c97dfaea623371e93bb7dacfa9bf83598431ce9", 0x99}, {&(0x7f00000014c0)="0a72562488dcc5ef5109e74c767a1754ebf3c8b94ce3c65de2455918ced43b00d9b01b02b357ca45e3e7e89fd089c94c091661dac4020d78617cb2dbb3e2cf9cde6ff16cc18b4595a7ff45837df827aea57608e3b0335c4c578938011c742d7ff6c9a42b8dcde75d3c2f9e5465631dc3c1eb3bfefd6ef4a405979032663549e3414128e1be0f1d486d25f67650420be64c4a577a53364cfdbc2a27008af016a94ddbeadbb68ab75e1476ca0424a3913135deb50f4d8ff5709297a1100144bca2385569a0fa5993888a063b4667d6f3792a93357754c99f49d0b90f8eba", 0xdd}], 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_dev$sndpcmp(0x0, 0x7, 0x400000) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000080)) 16:51:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setownex(r0, 0xf, &(0x7f0000000040)={0x0, r1}) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000140)=0x3, 0x4) 16:51:42 executing program 2: syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x1ff, 0x2) 16:51:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5409, 0x0) 16:51:42 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'g%oup_id'}}) 16:51:42 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vsock\x00', 0x50000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000800)='/dev/vcsa#\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xb7, 0x2000) sendmsg$rds(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/245, 0xf5}, {&(0x7f0000000200)=""/113, 0x71}], 0x2, &(0x7f00000005c0)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x5}, &(0x7f00000002c0)=0x9, &(0x7f0000000300)=0x100, 0x8, 0x7, 0xffffffff, 0x8, 0x9, 0x3ff}}, @mask_cswp={0x58, 0x114, 0x9, {{0x2, 0x7fff}, &(0x7f0000000340), &(0x7f0000000380)=0x9, 0xc014, 0x2, 0x9, 0x7fffffff, 0x40, 0x489d}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x9}, &(0x7f00000003c0)=0xc006, &(0x7f0000000400)=0x1000, 0xa3c, 0x80000000, 0x1, 0xa7c, 0x1, 0x6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000440)=""/175, 0xaf}, &(0x7f0000000500), 0x2}}, @cswp={0x58, 0x114, 0x7, {{0x9, 0x3}, &(0x7f0000000540)=0x3a493efb, &(0x7f0000000580)=0x80000001, 0x2, 0x0, 0x9, 0xf52, 0x20, 0x400}}], 0xfffffffffffffd00, 0x40000}, 0x80) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x151, 0x4) socket$kcm(0x29, 0x5, 0x0) 16:51:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000ffb800"}, 0x1c) 16:51:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:42 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 16:51:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x8004552d) 16:51:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha256\x00'}, 0x58) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0xf288) 16:51:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) 16:51:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000007fdc00"}, 0x1c) 16:51:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gr%up_id'}}) 16:51:43 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0xc06855c8) 16:51:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x755, 0x9, 0x3, 0xffffffffffffffff, 0x9}, 0x2c) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8, 0x8000) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x1f}, [@generic={0x888b, 0x6, 0x6, 0x2, 0x7f800000000}]}, &(0x7f0000000080)='syzkaller\x00', 0x1000, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x1, [], 0x0, 0x7}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000003e800"}, 0x1c) 16:51:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grdup_id'}}) 16:51:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xf) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 16:51:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000200)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1a, 0x0, 0x4, 0x7, 0x8}, 0x2c) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20002, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f00000000c0)=""/206) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000fffffdef00"}, 0x1c) 16:51:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) 16:51:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000080)=""/45, 0x2d, 0x0, &(0x7f00000000c0)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @broadcast}}, 0x24) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000100)=""/51) 16:51:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grsup_id'}}) 16:51:43 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x3f}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) [ 829.337332][T22365] input: syz0 as /devices/virtual/input/input22 16:51:43 executing program 4: bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 16:51:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000001f400"}, 0x1c) 16:51:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gruup_id'}}) 16:51:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000040)="e893766486f134", 0x7}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="ec60bc6b0a6ac9e3e90026977b7545f6e63463ba84058434cf303fa7612ee986c39a58b3f5edb196ad5b06cd5ca4e4f97d3542b7c058b7a93878205ba5d487f55c7a94fedef0be7dcf013d380ceaf2ab200f847843125903d7ac311319ce851bb28cdf075fff045426cde0c6460247bf8b898e9b2a16292ad98f9eb651864e89bdda979b55443d96f2f3f69a16611498625a258b6a20cf15cdaefd1d87d0498fa1ff6ba47ea26d3b3dd178e2c9dbec62676ab4075ac2abdc7092fbe6", 0xb2}, {&(0x7f0000000140)="dc00ebf5e55f693fc7fd4927d3d94a7864ad65e7c5ea1793b2076682866fce465dbf9ced0dfa95916e0c8314cef27e284abcc62459652e52003499a2bf4dc823be9bced2cb3a4b2afeb950bc34b96232f52e1a37397d246e693dd5d2c00ee5d42ba167dd3b56c378eeaf78518a91ca28f49ce261adfa6f844ec58b54bdc771de3c32642c9a3a", 0xffffffffffffffb2}], 0x4, 0x0) r1 = shmget$private(0x0, 0x2000, 0x1004, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sctp\x00') ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000040)={0x1, 0x0, [{}]}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:43 executing program 2: 16:51:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000fffffff500"}, 0x1c) 16:51:44 executing program 2: 16:51:44 executing program 0: 16:51:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000300)="71096c7f1d443af107adf159c2654c3ca4f69f3c651dfb469861c0d472114ca639ac43c6c5a3db00f62eb57923dcae3e218f63d3c32d3ff7cff1466d679e11780d3a5b075ae31cf188e33180facc04a514614d64670cfcf7dfa17a0d081676833875d818fef018b0d1b62f0cf6e2cf5c5c4238b171673a9696a68201f68e1f4d316075fe706a5888569e09df13127d3f1c31b71f55d40d4e8f42d0eb30c28ba3279afe3a804b6b8a309b9f1f87567b1390ba4e43f87700702101b983cf7f5f83da", 0x0}, 0xfe48) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000180)) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000080)={0xb, @output={0x1000, 0x1, {0x4, 0x4}, 0xb9, 0x81}}) 16:51:44 executing program 2: 16:51:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grxup_id'}}) 16:51:44 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f00000002c0)={0x0, {0xffff, 0x1}}) ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) accept4(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000080)=0x80, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000280)=0xb) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000480)='\xac\x00', 0x6) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) write$FUSE_LK(r2, &(0x7f0000000540)={0x28, 0xfffffffffffffffe, 0x4, {{0x3ff, 0x95e, 0x3}}}, 0x28) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f0000000180)) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000004c0)=0x5) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f00000001c0), &(0x7f0000000240)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) 16:51:44 executing program 0: 16:51:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000000fc00"}, 0x1c) 16:51:44 executing program 2: 16:51:44 executing program 2: 16:51:44 executing program 0: 16:51:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro#p_id'}}) 16:51:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@filter={'filter\x00', 0xe, 0x2, 0x278, [0x0, 0x20000300, 0x20000458, 0x20000488], 0x0, &(0x7f0000000080), &(0x7f0000000300)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x1f, 0x23, 0xaff, 'nr0\x00', 'erspan0\x00', 'batadv0\x00', 'syzkaller0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xc0, 0xf8, 0x128, [@ipvs={'ipvs\x00', 0x28, {{@ipv6=@ipv4={[], [], @local}, [0xffffffff, 0x0, 0xffffffff], 0x4e20, 0x0, 0x7, 0x4e21, 0x1, 0x1}}}]}, [@common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x7, 0x2, 0x884c, 'sit0\x00', 'nr0\x00', 'ip6tnl0\x00', 'veth1_to_bridge\x00', @random="b19390c00bb8", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @local, [0x0, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8, 'syz1\x00', 0xffffffffffff0001}}}}]}]}, 0x2f0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:44 executing program 0: 16:51:44 executing program 2: 16:51:44 executing program 0: 16:51:44 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro%p_id'}}) 16:51:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r0, 0x0, 0x0, 0x8000000000000}, 0xffffffffffffffc3) 16:51:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x200000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x240000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004004}, 0x4004000) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4c430005}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x11, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40000) 16:51:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000080fe00"}, 0x1c) 16:51:45 executing program 2: 16:51:45 executing program 0: 16:51:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$VIDIOC_S_OUTPUT(r1, 0xc004562f, &(0x7f00000000c0)=0x6) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x494440, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x1, 0x4) 16:51:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f00000000c0)={0x9cc1, "d3f25d16ec8cea6c4314602a5590a4ec6f7391dc6e76ea960fdeb59cc4c540b5", 0x2, 0xa123, 0x4, 0x200000, 0x2050612, 0x8}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8400, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001840)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000001880)={@remote, 0x4b, r3}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) timerfd_create(0x0, 0x80000) 16:51:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro*p_id'}}) 16:51:45 executing program 2: 16:51:45 executing program 0: 16:51:45 executing program 1: syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7, 0x4002) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x3, 0x758, 0x9, 0x4000000000000000}, 0x2c) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:45 executing program 2: 16:51:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x3) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000000c0fe00"}, 0x1c) 16:51:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro+p_id'}}) 16:51:45 executing program 0: 16:51:45 executing program 2: 16:51:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) prctl$PR_SET_KEEPCAPS(0x8, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getpeername(r1, &(0x7f0000000400)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000180)=0x80) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x42cf, 0x200000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x1c4, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffb}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffffffffff85}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1c}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x52}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f3396b9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffeff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}]}]}, 0x1c4}}, 0x4044040) 16:51:45 executing program 1: pread64(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c, 0x0) 16:51:45 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) 16:51:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x20) 16:51:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro-p_id'}}) 16:51:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000a82ff0fe00"}, 0x1c) 16:51:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0x2}, &(0x7f0000000180)=0x8) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000040), 0x0) 16:51:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) write$binfmt_script(r1, 0x0, 0x26c) 16:51:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x220200, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xff) pipe(&(0x7f0000000040)) [ 831.476503][T25094] Unknown ioctl 21531 16:51:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro.p_id'}}) 16:51:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) 16:51:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000000000ff00"}, 0x1c) 16:51:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x3ec) 16:51:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:46 executing program 4: syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x420001, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000300)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r2, 0x23, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x80000001, @link='syz1\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x10) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x800, 0x501) connect$pppoe(r3, &(0x7f0000000040)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'lapb0\x00'}}, 0x1e) 16:51:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x14) r1 = add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="40f7be9215c752f2566c534c6bd27e5b79424e1c4fab49d95bf58589e773709a368bac980290040584af65c5d12da9f1e0af1cd174fe2fa028dd85fe9d02529008e523096d223873bb9d302858d4afd43ea9b757c4ffc0f423e96f017c8e186169a71e7fc090a764db307e38ed95abc09abdf440e427d5082a1fdb51bd930e789262dbed124671e35d68050936059052b5677c9428c2", 0x96, 0xfffffffffffffffb) r2 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='\x89/proc$\x00', 0xfffffffffffffffe) keyctl$link(0x8, r1, r2) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x200, 0x0) 16:51:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gro0p_id'}}) 16:51:46 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7f, 0x800) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x400, 0x70bd2a, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000014}, 0x20008080) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) 16:51:46 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 16:51:46 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) 16:51:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0xfffffffffffffffb}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0xffffffffffffff92) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xffff, 0x18b002) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000040)) 16:51:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groXp_id'}}) 16:51:46 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000000000fff00"}, 0x1c) 16:51:46 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000005c0)={0x0, 0x1, 0x0, "afe833145970bc5d3661e854f255eb19c9bfcd4c14efc228aab3fe6319899724"}) 16:51:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000080)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000000c0)="76d6bfee2f268dcb8a9af9d8564c8f1536c660174f5a58c9ee08c6ad2c84a8fe59dbb31cabfcf738db460f38e8b838b25e8afe761fbbc53fec93859cf8a404acbadfbc373bf926333d35108877b106fc0ac6d43d45e6c586bdad9d504c3d0a92d3ca1ebfb94d63b46a2bd013eb7b21ffae11bd37957896fc5e789568a4b55d5be126b495ddcd3a6ad872936c9b8e9db2a921c91ad7216d43255b1df1e455c8612456d4e78c38", 0x0}, 0x18) semget(0x0, 0x7, 0x44) 16:51:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0, 0x3}, 0x20) 16:51:46 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grocp_id'}}) 16:51:47 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 16:51:47 executing program 4: lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='udf\x00', 0x8010, &(0x7f00000002c0)='trusted.overlay.redirect\x00') bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@empty, @in6=@loopback}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='map_files\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000004c0)={{{@in6, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000480)=0x6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000001200)="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", &(0x7f0000000200)="eac190a6f546aa8a603fdf85f465aa0ec03a25e67a667a1c2aadbd2a9be09508d1b0000000ff0f192436823151823c91cefe782e8af2dc060000005732"}, 0x20) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grodp_id'}}) 16:51:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000000ffffffff00"}, 0x1c) 16:51:47 executing program 1: r0 = semget(0x1, 0x6, 0x200) semctl$SEM_INFO(r0, 0x0, 0x13, &(0x7f0000000040)=""/52) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x7fff, 0x400) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x1000, 0x7, [0x1f, 0xffffffff, 0x9234, 0x100000001, 0x3f, 0x1, 0xffffffff00000000]}, &(0x7f0000000100)=0x16) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000140)={r2, @in6={{0xa, 0x4e21, 0x9, @rand_addr="90fe751be94ed3f195db24d282b73ae2", 0x8}}}, 0x84) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r3, &(0x7f00000007c0), 0x0}, 0x18) 16:51:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) accept$alg(r1, 0x0, 0x0) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$kcm(0x11, 0x400000002, 0x300) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) recvmsg$kcm(r0, &(0x7f000000a080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe98}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8906, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 16:51:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groip_id'}}) 16:51:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000200"}, 0x1c) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) 16:51:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9, 0x0, 0xffffffffffffff9c}, 0x2c) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r1 = dup3(r0, r0, 0x80000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xc0, &(0x7f0000000180)="eaee6640978fa12d7791c00dc121bb69f05d1cb11239d82ab5b29fec14cfdb3854efe4b6011919b7ddacae98e2cc870a3e947c42ff8eca9bbb295747ff8b6e825e4b9ef295a8c519e972cd1c1ee65d20d7dd9d2452c9f38f680d62b7868f8d655b7c1c3206b03f1f8097b5b858ccbf7b69fccfc5b1e16582b160", 0x7a) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x8, 0x0, &(0x7f0000000040)=[@decrefs={0x40046307, 0x2}], 0x66, 0x0, &(0x7f0000000080)="e24949a69fd5be6f95b5640215eec3eb9a98127218b591a3f59ef6e961b1b1ee496dd61e1080db1f1d4bbc15acf6eee185914d2f5e613a025f75824cbd8c2e4e80c2833b34e7fbcf779e53de4375120a15d36b9de2b93b5ed3049510263dda2712d079f72aebfa18ddb7f3e8a05146d723ff0b89a0061b5156c9550e633f4d1cf95f225145c17292ca209d22b2d868f361661e0c489921ac705c6f60"}) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) 16:51:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000000)="dc17eb820472f4d2f419cf830948c82b4fdcb8505d085cbf1b983bc0e61a219ce6"}, 0x10) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grolp_id'}}) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) [ 833.295644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 833.301483][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 833.307333][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 833.313095][ C0] protocol 88fb is buggy, dev hsr_slave_1 16:51:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0xa2ffff) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) 16:51:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000300"}, 0x1c) 16:51:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groop_id'}}) 16:51:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) r2 = dup(r0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)={0x3, 0xf8, "d6b1ff051613aef0fe15c753d94671f956bbf0e56b4a446a17f12e734921df34d60ebbd039e592a2588aea077415b7b78f802b985346872522757c58009643ce11a1dbd38c19061812d337715248596ae17f26db732d371f67d470696b69c116dfb65a7e47ccd19ca919d2b0fd22a3f54b7ffab94d511e28afea82a5bd11ac3f83f69c65ac36af1a3c5ce4ff0fddebb7cafdbcf2b8ec11c9c0d25c04a2d6fda65982852aadcd83941de1033745bfb1f90a30a28f1780afed696f68f50ae13767198e404bd00ac7159092f2665dd6436ad179b29bc274d714ea304ffae96cbb628af5b1ea3347d3c99c82f8b2b7b39e20cf9c01e0dcc8346a"}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x506}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000100)={r2, r3, 0x1}) 16:51:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000100)) 16:51:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0x32, 0x0, &(0x7f0000000000)) 16:51:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'gropp_id'}}) 16:51:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', r2}) 16:51:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000400"}, 0x1c) 16:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x4008ae6a, &(0x7f00000001c0)={[{0x0, 0x48}]}) 16:51:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xd, 0x800) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0xffffffff7fffffff, 0x2) 16:51:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grosp_id'}}) 16:51:48 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x9, 0x758, 0x5, 0x0, r0}, 0x2c) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) ptrace$peek(0x2, r2, &(0x7f00000000c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000500"}, 0x1c) 16:51:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x12f) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xa8, 0x500) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000000c0)="56af74c83621013eb1ba3df4812c161dac164fda9be5ba88c6db7cbc2b0bc5ff345f8ca881c8c9c41f30f749f23c51e80257f5bb2edac4224b918444ce5be5fbe75c130d19f70e9d64fbdb1d95effb40a07ed637a8b298a1f061e97c8fd24a6a932314fd68b8510ed0fb764b20a54024b2bb3fb80c81f79162974b2738107942943b3ed54bd48bc691838f3a1688812d8a9a69bcdbd59c8c6632903d6b0e2853092cb851e24f93648ed76c3717f66ebfb773a6a4774f92824c", 0xb9) 16:51:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000600"}, 0x1c) 16:51:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grovp_id'}}) 16:51:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2c67, 0x24400) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x200, 0x3f, 0x5, 0xd68c, 0x5, 0xfffffffffffffffc, 0x7, 0x1, 0x1, 0xc2bf, 0x400}, 0xb) 16:51:48 executing program 1: syz_execute_func(&(0x7f0000000040)="f02963772e0f0f543d0fa4c481205408660f3809edc44175d317660fe43db87a0000c442313dfc0f5a15693ed655c46250f27809c4a2fd32f6") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xf) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) [ 834.393489][T29749] kvm: pic: single mode not supported [ 834.429407][T29749] kvm: pic: level sensitive irq not supported [ 834.430610][T29749] kvm: pic: level sensitive irq not supported 16:51:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) [ 834.513886][T29749] kvm: pic: single mode not supported 16:51:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000080)=0xfb, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 16:51:49 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x2) socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x7, 0x7, 0x18, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 16:51:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groxp_id'}}) 16:51:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:49 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0x2) socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000040)="d6c5a78ead2a283f1c4f176323ba55ee629153110418651afb29f76c73c1e5892afbb2d5daee2bc14dd76223870d27da0daa6f5e48b4a752ad8ec9aa7a37c6de", 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 16:51:49 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80000000, 0x22000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x2, 0x7, 0x8, r0, 0x4}, 0xfffffffffffffe7f) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000000)={r1, 0x0, 0x0, 0x400}, 0x20) 16:51:49 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou#_id'}}) 16:51:49 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou%_id'}}) 16:51:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:51:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0xfffffffffffffec2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xed) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000002800)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) 16:51:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = open(&(0x7f0000000140)='./file0\x00', 0x82401, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000200)={0x0, 0x3, 0x4, [], &(0x7f00000001c0)=0x2}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x940000}, 0x200000}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f00000000c0)=0x4) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r3, 0x3}, 0x8) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80016}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r4, 0x400, 0x70bd27, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x8000) 16:51:49 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x14, 0x4, 0x7, 0x8, 0xffffffffffffffff, 0x80000000004}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou*_id'}}) 16:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:51:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = getpid() ptrace$pokeuser(0x6, r1, 0x6, 0x8) prctl$PR_GET_FP_MODE(0x2e) 16:51:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:50 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x204000, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000500)={0x0, 0x4}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={r1, 0x206}, &(0x7f00000005c0)=0x225) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfffffffffffff5b7, 0x40080) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x0, 0x1, 0x9, 0x0, r2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r3, &(0x7f00000007c0), 0x0}, 0x18) 16:51:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:51:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou+_id'}}) 16:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000e00"}, 0x1c) 16:51:50 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou-_id'}}) 16:51:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000001000"}, 0x1c) 16:51:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x38102) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0xaa, 0x80, 0x1, {0xb, @win={{0x6, 0x0, 0x5, 0x9}, 0x2, 0x3, &(0x7f0000000140)={{0x101, 0x9, 0x5, 0x3}, &(0x7f0000000100)={{0xbd, 0x80, 0xffffffff, 0x3}, &(0x7f00000000c0)={{0x6, 0x9, 0xfffffffffffffffc, 0x3}}}}, 0x2, &(0x7f0000000200)="c6c7ff5db76bf8b9cd6bf56c2406834c87dc001d1bf7ca15a70bb859e350074a73cc600a7b036c77d889ef5568a574cb62594fc4cf2db5e49c0d854a994cfff252f75a933974cc1ef55ce16e0d374468a56141b39fba51cfffcfaa36779007a8019034af8848527e62abbcaeca9858c29f8decebea827bca091e8e88af813f68646146733f2db32b80ca1d0f9adf3326758add5e0b48a00a5cb9d61af3fe9d30064ac774b48817c030a9551bcdb7300616ad6682d2e898050247", 0x7}}}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000003c0)={{0xdd, 0x7fffffff}, {0x9, 0x45d8000000000000}, 0x100000000, 0x7, 0x2}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="db59c3b8f621f65f7db1edbaff2df0af", 0x10) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000004c0)={&(0x7f0000000480)=[0x5, 0x7fff, 0xffffffffffffff7e, 0x100, 0x6, 0x1ff, 0x800, 0x4, 0x9], 0x9, 0x4, 0x8, 0x10001, 0x862d, 0x545, {0x7, 0x5, 0x8, 0x8, 0x8, 0x2, 0xffffffff, 0x8000, 0x10000, 0x9, 0x10001, 0x10000, 0x2, 0x9d, "e777d7556cf82acaf9d9cbf9a68fe4ef189976b7fa58d4615e1e43eab8cc60f6"}}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000180)=0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) sched_setaffinity(r2, 0x8, &(0x7f0000000440)=0x1ff) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) 16:51:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) [ 836.415687][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 836.421530][ C1] protocol 88fb is buggy, dev hsr_slave_1 16:51:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xbe, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000080)={0x100, 0xffffffff, 0x7}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou._id'}}) 16:51:50 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000040)={0x1f, {0x101, 0x4, 0x1, 0xe4d, 0xfffffffffffffffd, 0x3}, 0x80}, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:50 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000006100)='/dev/ion\x00', 0x0, 0x0) 16:51:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:51 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1Tto_bond\x00', 0x3802}) 16:51:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grou0_id'}}) 16:51:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x101000, 0x0) socket$unix(0x1, 0x5, 0x0) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000300)=0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000380)={0x2, r2}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @loopback}}, 0x3, 0x8}, &(0x7f0000000140)=0x90) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e22, @local}}}, 0x84) 16:51:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x9, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000040)={r0, 0x0, 0x0, 0x1}, 0xfffffec8) 16:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "69abee2c75bfc09862e38c09fe08f1a8"}, 0x11, 0x1) r1 = dup(r0) getpeername(r1, &(0x7f0000000100)=@can, &(0x7f0000000180)=0x80) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)='security.evm\x00'], &(0x7f00000004c0)=[&(0x7f0000000480)='security.evm\x00']) 16:51:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grouX_id'}}) 16:51:51 executing program 2: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x6004, 0x0) 16:51:51 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14, 0x800) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x81, 0x4, 0x4, 0x9, 0x5, 0x80000001}, 0x1c) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000480)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffff, 0x4000) ioctl$DRM_IOCTL_AUTH_MAGIC(r3, 0x40046411, &(0x7f0000000180)=0x7fffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r4, &(0x7f0000000100)="bbeed9c0d0494a1563120de2969755a5621d3b97fcc45de9", 0x0}, 0x18) 16:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fc00"}, 0x1c) 16:51:51 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xf2f3, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x8000004, 0x26, 0x8, r0}, 0x29a) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:51 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) splice(r1, &(0x7f0000000040)=0x8000, r0, 0x0, 0x2, 0x0) 16:51:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grouc_id'}}) 16:51:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, r1, 0x0, 0x26, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00'}, 0x30) pipe(&(0x7f0000000400)) ptrace$poke(0x5, r4, &(0x7f00000003c0), 0x2) write$FUSE_ATTR(r1, &(0x7f0000000300)={0x78, 0xfffffffffffffffe, 0x5, {0x9, 0xfeec, 0x0, {0x4, 0x9, 0x401, 0x5, 0x2800, 0x3, 0xfff, 0x5, 0xfffffffeffffffff, 0x2, 0x9, r2, r3, 0x1, 0x1}}}, 0x78) 16:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000f40100"}, 0x1c) [ 837.454438][ T2050] [ 837.456793][ T2050] ====================================================== [ 837.463830][ T2050] WARNING: possible circular locking dependency detected [ 837.471801][ T2050] 5.1.0-rc2+ #39 Not tainted [ 837.476384][ T2050] ------------------------------------------------------ [ 837.483409][ T2050] syz-executor.2/2050 is trying to acquire lock: [ 837.489733][ T2050] 000000001b5c8d64 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 837.497216][ T2050] [ 837.497216][ T2050] but task is already holding lock: 16:51:51 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x7fff, 0x18}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x3, 0x758, 0x9, 0x0, r0, 0x80}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000180200"}, 0x1c) [ 837.504576][ T2050] 000000001df847bc (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 837.512484][ T2050] [ 837.512484][ T2050] which lock already depends on the new lock. [ 837.512484][ T2050] [ 837.522882][ T2050] [ 837.522882][ T2050] the existing dependency chain (in reverse order) is: [ 837.531898][ T2050] [ 837.531898][ T2050] -> #2 (&pipe->mutex/1){+.+.}: [ 837.538950][ T2050] lock_acquire+0x16f/0x3f0 [ 837.543972][ T2050] __mutex_lock+0xf7/0x1310 [ 837.549453][ T2050] mutex_lock_nested+0x16/0x20 16:51:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x22180, 0x0) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000000180)) rt_sigqueueinfo(r1, 0x28, &(0x7f00000000c0)={0x1d, 0x9, 0x2}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) [ 837.554741][ T2050] fifo_open+0x159/0xb00 [ 837.559502][ T2050] do_dentry_open+0x488/0x1160 [ 837.564784][ T2050] vfs_open+0xa0/0xd0 [ 837.569289][ T2050] path_openat+0x10e9/0x46e0 [ 837.574399][ T2050] do_filp_open+0x1a1/0x280 [ 837.579432][ T2050] do_open_execat+0x137/0x690 [ 837.584634][ T2050] __do_execve_file.isra.0+0x178d/0x23f0 [ 837.590782][ T2050] __x64_sys_execve+0x8f/0xc0 [ 837.595984][ T2050] do_syscall_64+0x103/0x610 16:51:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000400200"}, 0x1c) [ 837.601099][ T2050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.607509][ T2050] [ 837.607509][ T2050] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 837.614497][ T2452] QAT: Invalid ioctl [ 837.615235][ T2050] lock_acquire+0x16f/0x3f0 [ 837.615260][ T2050] __mutex_lock+0xf7/0x1310 [ 837.629155][ T2050] mutex_lock_killable_nested+0x16/0x20 [ 837.635216][ T2050] do_io_accounting+0x1f4/0x830 [ 837.640599][ T2050] proc_tgid_io_accounting+0x23/0x30 [ 837.646402][ T2050] proc_single_show+0xf6/0x170 16:51:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9, 0x0, 0xffffffffffffffff, 0x101}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000080)="a3afc46f15e4af723680f6705dfa33444aa3e3b975bff174f45b58b63fc4f527b3ffc92f3a6ce382ffce67a091e7c72718dbd11565d73ef1d81b8726717ef72c16a2b22d2c3bad56979971dabe2faeb6ddbf13087ddbc31d3f7cbfb1b4b76f57ab43c0684158cd5de1e599a99f37b452121b2425db245fe51e9c1ee56e122b61df53b160777594358daf106eb7762e7adfb2d2b937a9a25a3b5bdd40c3bd8c083c5c7e881745c5695b5b7f545659544af58cbe41ddd031567b30b52e4acbb823f99b48b6a09977361c7c96dc00b9265a", 0x0}, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000180)={0x1bf8c256, 0x2, 0x1, 'queue1\x00', 0xf3ba}) [ 837.651687][ T2050] seq_read+0x4db/0x1130 [ 837.656451][ T2050] do_iter_read+0x4a9/0x660 [ 837.661566][ T2050] vfs_readv+0xf0/0x160 [ 837.666254][ T2050] do_preadv+0x1c4/0x280 [ 837.671019][ T2050] __x64_sys_preadv+0x9a/0xf0 [ 837.676216][ T2050] do_syscall_64+0x103/0x610 [ 837.681328][ T2050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.687731][ T2050] [ 837.687731][ T2050] -> #0 (&p->lock){+.+.}: [ 837.694244][ T2050] __lock_acquire+0x239c/0x3fb0 [ 837.699624][ T2050] lock_acquire+0x16f/0x3f0 16:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000300"}, 0x1c) [ 837.704653][ T2050] __mutex_lock+0xf7/0x1310 [ 837.709693][ T2050] mutex_lock_nested+0x16/0x20 [ 837.714974][ T2050] seq_read+0x71/0x1130 [ 837.719654][ T2050] proc_reg_read+0x1fe/0x2c0 [ 837.724773][ T2050] do_iter_read+0x4a9/0x660 [ 837.729792][ T2050] vfs_readv+0xf0/0x160 [ 837.734477][ T2050] default_file_splice_read+0x475/0x890 [ 837.740545][ T2050] do_splice_to+0x12a/0x190 [ 837.745570][ T2050] do_splice+0x10a9/0x13c0 [ 837.750515][ T2050] __x64_sys_splice+0x2c6/0x330 16:51:52 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80200, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) [ 837.755888][ T2050] do_syscall_64+0x103/0x610 [ 837.760997][ T2050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 837.767401][ T2050] [ 837.767401][ T2050] other info that might help us debug this: [ 837.767401][ T2050] [ 837.777622][ T2050] Chain exists of: [ 837.777622][ T2050] &p->lock --> &sig->cred_guard_mutex --> &pipe->mutex/1 [ 837.777622][ T2050] [ 837.790547][ T2050] Possible unsafe locking scenario: [ 837.790547][ T2050] [ 837.797991][ T2050] CPU0 CPU1 [ 837.801865][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 837.803356][ T2050] ---- ---- [ 837.815808][ T2050] lock(&pipe->mutex/1); [ 837.819355][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 837.820139][ T2050] lock(&sig->cred_guard_mutex); [ 837.837797][ T2050] lock(&pipe->mutex/1); [ 837.844645][ T2050] lock(&p->lock); [ 837.848451][ T2050] [ 837.848451][ T2050] *** DEADLOCK *** [ 837.848451][ T2050] [ 837.856604][ T2050] 1 lock held by syz-executor.2/2050: [ 837.861968][ T2050] #0: 000000001df847bc (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 837.870316][ T2050] [ 837.870316][ T2050] stack backtrace: [ 837.876195][ T2050] CPU: 0 PID: 2050 Comm: syz-executor.2 Not tainted 5.1.0-rc2+ #39 [ 837.878781][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 837.884057][ T2050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 837.884061][ T2050] Call Trace: [ 837.884082][ T2050] dump_stack+0x172/0x1f0 [ 837.884105][ T2050] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 837.893487][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 837.901241][ T2050] check_prev_add.constprop.0+0xf11/0x23c0 [ 837.901257][ T2050] ? check_usage+0x570/0x570 [ 837.901272][ T2050] ? graph_lock+0x7b/0x200 [ 837.901291][ T2050] ? __lockdep_reset_lock+0x450/0x450 [ 837.945124][ T2050] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 837.951342][ T2050] __lock_acquire+0x239c/0x3fb0 [ 837.956171][ T2050] ? is_bpf_text_address+0xac/0x170 [ 837.961347][ T2050] ? mark_held_locks+0xf0/0xf0 [ 837.966088][ T2050] lock_acquire+0x16f/0x3f0 [ 837.970570][ T2050] ? seq_read+0x71/0x1130 [ 837.974881][ T2050] ? seq_read+0x71/0x1130 [ 837.979187][ T2050] __mutex_lock+0xf7/0x1310 [ 837.983678][ T2050] ? seq_read+0x71/0x1130 [ 837.987994][ T2050] ? seq_read+0x71/0x1130 [ 837.992302][ T2050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 837.998516][ T2050] ? mutex_trylock+0x1e0/0x1e0 [ 838.003259][ T2050] ? aa_file_perm+0x432/0xeb0 [ 838.007912][ T2050] ? get_page_from_freelist+0x129c/0x4170 [ 838.013617][ T2050] ? aa_path_link+0x460/0x460 [ 838.018270][ T2050] ? seq_dentry+0x2d0/0x2d0 [ 838.022747][ T2050] mutex_lock_nested+0x16/0x20 [ 838.027496][ T2050] ? fsnotify+0x811/0xbc0 [ 838.031803][ T2050] ? mutex_lock_nested+0x16/0x20 [ 838.036721][ T2050] seq_read+0x71/0x1130 [ 838.040852][ T2050] ? seq_dentry+0x2d0/0x2d0 [ 838.045330][ T2050] proc_reg_read+0x1fe/0x2c0 [ 838.049894][ T2050] ? proc_reg_compat_ioctl+0x2a0/0x2a0 [ 838.055327][ T2050] ? rw_verify_area+0x118/0x360 [ 838.060152][ T2050] do_iter_read+0x4a9/0x660 [ 838.064630][ T2050] ? dup_iter+0x260/0x260 [ 838.068939][ T2050] vfs_readv+0xf0/0x160 [ 838.073069][ T2050] ? alloc_pages_current+0x10f/0x210 [ 838.078328][ T2050] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 838.084377][ T2050] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.090604][ T2050] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 838.096822][ T2050] ? iov_iter_revert+0xaa0/0xaa0 [ 838.101738][ T2050] ? aa_file_perm+0x40b/0xeb0 [ 838.106389][ T2050] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 838.112081][ T2050] ? iov_iter_pipe+0xba/0x2f0 [ 838.116753][ T2050] default_file_splice_read+0x475/0x890 [ 838.122277][ T2050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.128496][ T2050] ? iter_file_splice_write+0xbe0/0xbe0 [ 838.134040][ T2050] ? lock_acquire+0x16f/0x3f0 [ 838.138706][ T2050] ? pipe_lock+0x6e/0x80 [ 838.142948][ T2050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 838.149180][ T2050] ? fsnotify+0x811/0xbc0 [ 838.153486][ T2050] ? fsnotify+0xbc0/0xbc0 [ 838.157793][ T2050] ? fsnotify_first_mark+0x210/0x210 [ 838.163056][ T2050] ? security_file_permission+0x94/0x380 [ 838.168670][ T2050] ? rw_verify_area+0x118/0x360 [ 838.173516][ T2050] ? iter_file_splice_write+0xbe0/0xbe0 [ 838.179035][ T2050] do_splice_to+0x12a/0x190 [ 838.183515][ T2050] do_splice+0x10a9/0x13c0 [ 838.187909][ T2050] ? opipe_prep.part.0+0x2d0/0x2d0 [ 838.193004][ T2050] ? __fget_light+0x1a9/0x230 [ 838.197674][ T2050] __x64_sys_splice+0x2c6/0x330 [ 838.202503][ T2050] do_syscall_64+0x103/0x610 [ 838.207068][ T2050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 838.212940][ T2050] RIP: 0033:0x458209 [ 838.216813][ T2050] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 838.236392][ T2050] RSP: 002b:00007f089e565c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 838.244776][ T2050] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 16:51:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 838.252742][ T2050] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000005 [ 838.260689][ T2050] RBP: 000000000073bf00 R08: 0000000000000002 R09: 0000000000000000 [ 838.268635][ T2050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f089e5666d4 [ 838.276584][ T2050] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 00000000ffffffff [ 838.294004][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 838.314722][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 838.344738][ T7798] kobject: '0:50' (0000000031e45f12): kobject_uevent_env [ 838.355077][ T7798] kobject: '0:50' (0000000031e45f12): fill_kobj_path: path = '/devices/virtual/bdi/0:50' 16:51:52 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RSTATu(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="810000007d000000005f"], 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000140)='./bus\x00', 0x80402, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r3, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000000)=ANY=[]) 16:51:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) read$rfkill(r1, &(0x7f0000000080), 0x8) 16:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000e80300"}, 0x1c) 16:51:52 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x101100) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000003c0)={0x14, 0x0, 0x10000, 0x5}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000400)={0x1, r1}) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f00000002c0)={0x0, 0x80, 0x0, [], &(0x7f0000000180)=0x8000000000000000}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000300)=""/172) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r2, 0x0, 0x0}, 0x20) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0x100000001, 0x5, 0x9, 0x7dc7, 0x8, 0x7, 0x4}}) write$tun(r3, &(0x7f0000000200)={@val={0x0, 0x8035}, @val={0x3, 0x3, 0x3, 0x1, 0x100, 0x4000000000000000}, @ipv4={{0x7, 0x4, 0x6, 0x1, 0x77, 0x68, 0x1, 0xc14, 0x16, 0x0, @remote, @multicast1, {[@end, @ra={0x94, 0x6, 0x40}]}}, @igmp={0x11, 0x5, 0x0, @multicast2, "e7c99e5a9bbbf326ba7221ade7a38e462c46415d08202f13dd58a1a89491fe651bf21a97d923a2790e586e02274803580c0cb005966713bea562af940f2d5486a83fa9a7816413633757ee48a23f864b1899be"}}}, 0x85) 16:51:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groud_id'}}) 16:51:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 838.368059][ T7798] kobject: '0:50' (0000000031e45f12): kobject_cleanup, parent (null) [ 838.368971][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 838.377332][ T7798] kobject: '0:50' (0000000031e45f12): calling ktype release [ 838.388389][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 838.402328][ T7798] kobject: '0:50': free name [ 838.430555][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 838.440515][ T3244] kobject: '0:50' (000000009e84cb9c): kobject_add_internal: parent: 'bdi', set: 'devices' [ 838.461555][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:52 executing program 4: r0 = getpgrp(0xffffffffffffffff) getpgid(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) [ 838.478839][ T3244] kobject: '0:50' (000000009e84cb9c): kobject_uevent_env [ 838.486981][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 838.500959][ T3244] kobject: '0:50' (000000009e84cb9c): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 838.518456][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:51:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000500"}, 0x1c) 16:51:52 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 16:51:52 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groui_id'}}) [ 838.551431][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 838.589744][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:51:52 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) [ 838.621039][ T7798] kobject: '0:50' (000000009e84cb9c): kobject_uevent_env [ 838.630773][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 838.645089][ T7798] kobject: '0:50' (000000009e84cb9c): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 838.658519][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 838.670675][ T7798] kobject: '0:50' (000000009e84cb9c): kobject_cleanup, parent (null) [ 838.678964][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 838.682770][ T7798] kobject: '0:50' (000000009e84cb9c): calling ktype release [ 838.687933][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 838.694717][ T7798] kobject: '0:50': free name [ 838.717501][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 838.722095][ T3898] kobject: '0:50' (00000000805b10f6): kobject_add_internal: parent: 'bdi', set: 'devices' [ 838.724665][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 838.739842][ T3898] kobject: '0:50' (00000000805b10f6): kobject_uevent_env [ 838.745410][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 838.753164][ T3898] kobject: '0:50' (00000000805b10f6): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 838.759241][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 838.779754][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 838.786989][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 838.797891][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 838.805115][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 838.816882][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 838.824025][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 838.824288][ T7798] kobject: '0:50' (00000000805b10f6): kobject_uevent_env [ 838.837987][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 838.844885][ T7798] kobject: '0:50' (00000000805b10f6): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 838.849546][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 838.868370][ T7798] kobject: '0:50' (00000000805b10f6): kobject_cleanup, parent (null) [ 838.896572][ T7798] kobject: '0:50' (00000000805b10f6): calling ktype release [ 838.903909][ T7798] kobject: '0:50': free name [ 838.928481][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 838.938144][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:51:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x74, &(0x7f0000000000)={0x0, 0x0, 0x10}, &(0x7f0000000040)=0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r2 = dup3(r0, r0, 0x80000) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000040)) 16:51:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x200000001f, 0x4, 0x4, 0x66, 0x8}, 0x2c) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x14000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f00000000c0)={{0x0, 0x0, 0x7900, 0x0, 0x4}, 0x5, 0x6}) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0, 0x2}, 0x20) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f0000000040)={0x1, 0x5}) 16:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000600"}, 0x1c) 16:51:53 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 16:51:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groul_id'}}) [ 839.330174][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 839.359195][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 839.370394][ T4135] kobject: '0:50' (00000000db990eea): kobject_add_internal: parent: 'bdi', set: 'devices' 16:51:53 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) 16:51:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 16:51:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) [ 839.393142][ T4135] kobject: '0:50' (00000000db990eea): kobject_uevent_env [ 839.412029][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 839.451393][ T4135] kobject: '0:50' (00000000db990eea): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 839.461821][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0, 0x40}, 0xfffffffffffffdae) 16:51:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000100)={0x5, 0x2}) timerfd_create(0x7, 0x80800) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x480040, 0x0) write$FUSE_STATFS(r2, &(0x7f0000000200)={0x60, 0x0, 0x4, {{0x1, 0x7f, 0x9, 0x4, 0x7, 0x800, 0x8be, 0x10000}}}, 0x60) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000280)={0x2, r2}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x6000, 0x0) write$FUSE_WRITE(r3, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x3, {0x3}}, 0x18) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x8, 0x1b0, 0xfffffffffffff000, 0xf8}, {0x5eb9dec8, 0x7fff, 0xff, 0xa461}, {0x1ff, 0x6, 0x7fffffff, 0x5}, {0xffffffff00000000, 0xffff, 0x8, 0xffffffff80000000}, {0x5773, 0x2fa, 0x1ff, 0x3}]}, 0x10) sync_file_range(r2, 0x5, 0xf002a39, 0x4) 16:51:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:53 executing program 2: syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) 16:51:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 16:51:53 executing program 2: syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 839.492320][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 839.532011][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:51:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x200444, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x3ffffe, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U+', 0x5}, 0x28, 0x1) read(r1, &(0x7f00000002c0)=""/163, 0xa3) syz_open_dev$dri(&(0x7f0000000440)='/dev/dri/card#\x00', 0x9, 0x2) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000280)) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x9) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x208842, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000140)={0x5, 0x0, 0x0, 0xffff, '\x00', 0x10001}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000500)={0x6, 0xd, 0x8202, 0x3, 0x27, 0x8, 0x4, 0x2, r4}, 0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000480)={r4, 0x56, "4709a408b0c0555d1611f769a2c400e8ae1fd2c238fb26aed4c183f03fbaea28172dee13da9c47a381563070d22fabd6b625f7838267e75dbdced8dc7dc2a794d2ecf36848c02b8dc3edbd62dd149ea1305c782eff9a"}, &(0x7f0000000400)=0x5e) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x4, 0x7, 0x4, 0x5, 0x7, 0x9, 0x8, 0x200, r5}, 0x20) 16:51:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grouo_id'}}) 16:51:53 executing program 2: syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 839.592244][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 839.612093][ T7798] kobject: '0:50' (00000000db990eea): kobject_uevent_env [ 839.624242][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:51:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:54 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200081, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000300)='NET_DM\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r0, &(0x7f0000000080)="1db36f8c02dff74afe34b283cdb37ec81c3c4c590d85b2131f0a4d5b9e8056d4543da3b60d635d7a937b2d7d381a3aefe01579f12f672d0b318e7570804bff271cac2d06feb95192885f9e4af307d934ed0ae0719c7f6e915a3d4d2d10e94b60be3ea7855ca4fae0e8c082b5069d20285001ddb45fb59391e01359f504dcb5749a9fa6de29dc69fcbd0587470870b6818b567d1e80812303724248e3c17d4daf0dc1aa840459730c38f6fdfda430d59031f108f2af111f3511e389c1e2c617209516406ae72ca72beb7f1417cc197976d9e6", &(0x7f0000000180)=""/208}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 16:51:54 executing program 2: syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 839.635014][ T7798] kobject: '0:50' (00000000db990eea): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 839.657773][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 839.664928][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 839.682203][ T7798] kobject: '0:50' (00000000db990eea): kobject_cleanup, parent (null) 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 839.704187][ T7798] kobject: '0:50' (00000000db990eea): calling ktype release [ 839.714705][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 839.735607][ T7798] kobject: '0:50': free name [ 839.748003][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' 16:51:54 executing program 2: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x0, 0x8}, 0x2c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$KVM_SMI(r1, 0xaeb7) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f00000000c0)=0x8) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0, 0x5}, 0x28d3f7a6e20a0a22) [ 839.778626][ T5046] kobject: '0:50' (000000001667d86b): kobject_add_internal: parent: 'bdi', set: 'devices' [ 839.789198][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 839.804506][ T5046] kobject: '0:50' (000000001667d86b): kobject_uevent_env [ 839.818189][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:51:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x200000, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000200)={0x200, 0x1, @start={0x9, 0x1}}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r2 = accept$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0x10) getsockopt$inet_dccp_buf(r2, 0x21, 0xc0, &(0x7f0000000100)=""/84, &(0x7f0000000180)=0x54) 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000000e00"}, 0x1c) [ 839.834514][ T5046] kobject: '0:50' (000000001667d86b): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 839.857445][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 839.867324][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 839.886660][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 839.894177][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 839.908563][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 839.916394][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 839.928013][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 839.935320][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 839.947209][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 839.954523][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 839.966544][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 839.973858][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 839.985910][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 839.993153][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.005823][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 840.013142][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 840.024302][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.031704][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 840.042903][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 840.050262][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.061153][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 840.068487][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 840.079271][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env 16:51:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grous_id'}}) 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:54 executing program 2: 16:51:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2043, 0x0) getpeername$tipc(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x10) 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000021800"}, 0x1c) 16:51:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000040), 0x0}, 0x18) [ 840.086719][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 840.098337][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 840.105748][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.118058][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.125194][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:54 executing program 2: 16:51:54 executing program 1: r0 = socket$inet(0x2, 0x6, 0x80) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfe, 0x2102) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000180)={0xfffffffffffff001, "d1afcad7cf63cfc552df4ff4d9950e263883cf7638bc0e847462f6e0af27b480", 0x2, 0x1}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000008880)=0x1000, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000007c0), 0x0}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@local, @in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) [ 840.153012][ T7798] kobject: '0:50' (000000001667d86b): kobject_uevent_env [ 840.158526][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 840.168186][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 840.180045][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 840.188406][ T7798] kobject: '0:50' (000000001667d86b): fill_kobj_path: path = '/devices/virtual/bdi/0:50' 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 840.192485][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 840.223133][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.239572][ T7798] kobject: '0:50' (000000001667d86b): kobject_cleanup, parent (null) 16:51:54 executing program 2: [ 840.245914][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 840.270147][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 16:51:54 executing program 2: [ 840.301152][ T7798] kobject: '0:50' (000000001667d86b): calling ktype release [ 840.310864][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 840.334538][ T7798] kobject: '0:50': free name [ 840.358786][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.367163][ T5975] kobject: '0:50' (0000000060c78d1e): kobject_add_internal: parent: 'bdi', set: 'devices' [ 840.368851][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 840.378152][ T5975] kobject: '0:50' (0000000060c78d1e): kobject_uevent_env [ 840.394785][ T5975] kobject: '0:50' (0000000060c78d1e): fill_kobj_path: path = '/devices/virtual/bdi/0:50' 16:51:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'grouu_id'}}) 16:51:54 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x10000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x4, 0x4, 0x7, 0x13, r0, 0x8}, 0xfdad) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:54 executing program 2: 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x003\x00'}, 0x1c) 16:51:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0xffffffffffffff4d) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000280)="62cacfde3aed51966178eecf1dd836ebbdd1d476dfc04c8cebd526dcbdd4af4ff7fdc6addc69fd3745adbe6404b89eeb666629f0f2bbcc369960d19f064874d0e73fb20cf181e57528f61255727482aa19ffbfd337adcba9cf5bcf834df5d0a4491549b8524cc2fd126825433de1ca82ba180b9a0c380fbaace9772baf5c8ad9bfe189539cd32f60e781c3", 0x8b}], 0x1) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f00000007c0), 0x0}, 0x17b) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x600000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000200)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000100)={0xe, 0x3, 0x3, 0x8, 0xa0, "2836e97a61022f3dc946bacc3e393f96ed72f98beb86adba0f75390bcaf9d6e3545cbf0e0eb61b75641aa9ab445ac30570e3b470fd4ac7b85f79e116346d51107b83a738b70ae6aeed403bad96e45f1edefd259e5ab61701786496b740401af3173ece905de1e7f85090639e10a58223c741b09d5a85b57717cb8aefae5a7b9bbaf73c0754c7ad49647a88ed3cdabee5afca464c0148a253030aec203c424f05"}, 0xac) r4 = dup2(r2, r1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x38e, 0x0, 0x10003, 0x52}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f0000000080)={0x80000000, r5}) [ 840.404193][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 840.412623][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 840.427208][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 840.434346][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 840.447362][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.454497][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:54 executing program 2: [ 840.485088][ T7798] kobject: '0:50' (0000000060c78d1e): kobject_uevent_env [ 840.486920][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 840.502366][ T7798] kobject: '0:50' (0000000060c78d1e): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 840.502979][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 840.542474][ T7798] kobject: '0:50' (0000000060c78d1e): kobject_cleanup, parent (null) [ 840.544307][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:54 executing program 2: 16:51:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0xffffffffffffffdf) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2, 0x0, 0x4000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) 16:51:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40004040}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x264, r2, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7b9}]}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xfa5, @dev={0xfe, 0x80, [], 0x25}, 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x19e3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x404000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x67ab}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4ea69dc9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x167a}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x326}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x5, @mcast2, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x54a7}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x15a}]}]}, 0x264}}, 0x4000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) [ 840.584025][ T7798] kobject: '0:50' (0000000060c78d1e): calling ktype release [ 840.608412][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.620880][ T7798] kobject: '0:50': free name [ 840.652887][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.665037][ T6468] kobject: '0:50' (00000000e87834b2): kobject_add_internal: parent: 'bdi', set: 'devices' [ 840.676722][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 840.685088][ T6468] kobject: '0:50' (00000000e87834b2): kobject_uevent_env [ 840.689878][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 840.700812][ T6468] kobject: '0:50' (00000000e87834b2): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 840.701451][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 840.737546][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'groux_id'}}) 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:55 executing program 2: 16:51:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x2ad, 0x100) getsockopt$inet_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000140)=""/127, &(0x7f0000000200)=0x7f) 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) [ 840.744879][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.757978][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 840.765312][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 840.792768][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env 16:51:55 executing program 2: 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 840.801017][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 840.801025][ T7798] kobject: '0:50' (00000000e87834b2): kobject_uevent_env [ 840.801052][ T7798] kobject: '0:50' (00000000e87834b2): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 840.811862][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env 16:51:55 executing program 2: 16:51:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x5) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x10040) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x34000, 0x0) [ 840.873572][ T7798] kobject: '0:50' (00000000e87834b2): kobject_cleanup, parent (null) [ 840.875007][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 840.905851][ T7798] kobject: '0:50' (00000000e87834b2): calling ktype release 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000024000"}, 0x1c) [ 840.925654][ T7798] kobject: '0:50': free name [ 840.938999][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 840.952230][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:51:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 840.969271][ T7108] kobject: '0:50' (00000000b4669f0a): kobject_add_internal: parent: 'bdi', set: 'devices' [ 840.978654][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 840.986434][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 840.991604][ T7108] kobject: '0:50' (00000000b4669f0a): kobject_uevent_env [ 841.007404][ T7108] kobject: '0:50' (00000000b4669f0a): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.011423][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.045924][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 841.061714][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 841.069273][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 841.080348][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env 16:51:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group^id'}}) 16:51:55 executing program 2: 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00P\x00'}, 0x1c) 16:51:55 executing program 1: ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x2, [{}, {}]}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) 16:51:55 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x80000, 0x0) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 841.087525][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 841.098639][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 841.105863][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 841.134933][ T7798] kobject: '0:50' (00000000b4669f0a): kobject_uevent_env 16:51:55 executing program 2: 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 841.138271][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.163447][ T7798] kobject: '0:50' (00000000b4669f0a): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.173553][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000dc7f00"}, 0x1c) 16:51:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ip6_mr_cache\x00') 16:51:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0x7, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) r1 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x20, 0x123000) r2 = getuid() fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x800000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000170000,user_id=', @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB="2c6d61785f726561643d3078303030303030303030303030303034302c7375626a5f747970653d70726f632c6673757569643d357b6662617673772d3f3d32772d307f30312d323863392d7f7772003d3977792c61707072616973652c636f6e746578743d757365725f752c6f626a5f726f6c653d6e6f64657673656c662c736d61636b66736861743d766d6e65743173656c665c2d766d6e6574306d643573756d2c666f776e65723d", @ANYRESDEC=r4, @ANYBLOB="ff0100004f2c00"]) [ 841.209629][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 841.222064][ T7798] kobject: '0:50' (00000000b4669f0a): kobject_cleanup, parent (null) [ 841.237880][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' 16:51:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x428249fc, 0x420000) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0xe9, 0x4) [ 841.265547][ T7798] kobject: '0:50' (00000000b4669f0a): calling ktype release [ 841.267229][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 841.272868][ T7798] kobject: '0:50': free name [ 841.285235][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 841.328722][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 841.330646][ T7836] kobject: '0:50' (0000000040441ea8): kobject_add_internal: parent: 'bdi', set: 'devices' [ 841.345588][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 841.349024][ T7836] kobject: '0:50' (0000000040441ea8): kobject_uevent_env [ 841.362896][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.363584][ T7836] kobject: '0:50' (0000000040441ea8): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.373927][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 841.395369][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 841.403083][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 841.415235][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env 16:51:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group`id'}}) 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ip6_mr_cache\x00') 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fe8000"}, 0x1c) 16:51:55 executing program 4: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 841.422621][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 841.447496][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 841.454634][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 841.477174][ T7798] kobject: '0:50' (0000000040441ea8): kobject_uevent_env [ 841.492914][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.500605][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 841.503269][ T7798] kobject: '0:50' (0000000040441ea8): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.512470][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ip6_mr_cache\x00') 16:51:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000080)=0x100000000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000180)="d18c226d172b04ea5b58f612fba4bdc6ce30a00f70098403d94d041673ce47d7d9510efde963dfa38ceb6885806cb032a83f1ef1e9edb9907b538a27a50000000001000000bd0888cdc7aaa5917707dda29cae36353029c257f8ffffff15cc9058b1000000000000000000000000000000", 0x0}, 0x18) 16:51:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000ffb800"}, 0x1c) [ 841.533965][ T7798] kobject: '0:50' (0000000040441ea8): kobject_cleanup, parent (null) [ 841.546401][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 841.569151][ T7798] kobject: '0:50' (0000000040441ea8): calling ktype release [ 841.574943][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 841.593307][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 841.608198][ T7798] kobject: '0:50': free name [ 841.614368][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.622868][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:56 executing program 4: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) 16:51:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ip6_mr_cache\x00') [ 841.639543][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 841.654812][ T8524] kobject: '0:50' (0000000079006667): kobject_add_internal: parent: 'bdi', set: 'devices' [ 841.674896][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 841.689881][ T8524] kobject: '0:50' (0000000079006667): kobject_uevent_env [ 841.705253][ T8524] kobject: '0:50' (0000000079006667): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.714853][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 841.729037][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 841.740118][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 841.747638][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 841.758535][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 841.771959][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_%d'}}) 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000fec000"}, 0x1c) 16:51:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x3, 0x758, 0x7, 0x1}, 0x3ff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82000, 0x0) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) 16:51:56 executing program 4: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) 16:51:56 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ip6_mr_cache\x00') [ 841.788220][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 841.795358][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 841.822049][ T7798] kobject: '0:50' (0000000079006667): kobject_uevent_env 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:56 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) [ 841.843978][ T7798] kobject: '0:50' (0000000079006667): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 841.851183][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 841.862332][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 841.872026][ T7798] kobject: '0:50' (0000000079006667): kobject_cleanup, parent (null) 16:51:56 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) 16:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000007fdc00"}, 0x1c) 16:51:56 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x610200, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0x6, 0xa7, 0x7f, 'queue1\x00', 0x3}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000007c0), 0x0}, 0x18) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) [ 841.902678][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 841.906134][ T7798] kobject: '0:50' (0000000079006667): calling ktype release [ 841.923341][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) [ 841.967993][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 841.970222][ T7798] kobject: '0:50': free name [ 841.975155][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 842.020803][ T9340] kobject: '0:50' (00000000889521c6): kobject_add_internal: parent: 'bdi', set: 'devices' [ 842.022263][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.033891][ T9340] kobject: '0:50' (00000000889521c6): kobject_uevent_env [ 842.044830][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 842.048701][ T9340] kobject: '0:50' (00000000889521c6): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 842.066983][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 842.076024][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 842.090107][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 842.097959][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 842.109840][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 842.117233][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 842.130174][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 842.137425][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 842.148454][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.155924][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 842.167789][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 842.175019][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 842.186475][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 842.193723][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 842.204696][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 842.212088][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 842.223223][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 842.230607][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 842.241422][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.248788][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 842.261106][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:56 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_iD'}}) 16:51:56 executing program 4: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) 16:51:56 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) 16:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000003e800"}, 0x1c) 16:51:56 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="b4e1d5f5f0e19ef74ab4fa1a42754230899a15810a7914d6f95e34b3c73f37d6e63be3e43b0d983560694528f656f8c4c2f9ae69084279c0354d210d49ca9e97d58de20ea97ab6a6ccc2c659d15868c2be8ba0d64c9ec7e4f9ce58cc1218f6a7c4b6b0cd3484255d67317e35fd30161d9f81eb10a955358e9b4b7e5ecfbfd0a8d046ef2717b679c4b9142c6376a5b3a71fb50172aaf5bf2961efcf2b93436ed77209ddf2dc215db458", &(0x7f0000001300)=""/4096}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000140)=@tipc, &(0x7f00000001c0)=0x80, 0x80000) accept4$packet(0xffffffffffffff9c, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002680)=0x14, 0x80000) sendmsg$can_bcm(r1, &(0x7f00000027c0)={&(0x7f00000026c0)={0x1d, r2}, 0x10, &(0x7f0000002780)={&(0x7f0000002700)={0x7, 0x200, 0x8001, {0x77359400}, {}, {0x2, 0x6, 0x401, 0x9}, 0x1, @canfd={{0x2, 0x8, 0x3, 0x5}, 0x1b, 0x2, 0x0, 0x0, "bcae6c43d62f2b6867eac05a9c971ed1b7416504873c68a25facd5583b561a77938e7c97f90de0d98370ad8bc05dd2f331a745c2c9fd511ef944fb5a35359a9d"}}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x20008800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f0000000200), &(0x7f0000000240)="645b7f03245acb608a5d4f0ef0fbcb14e5e322cc4c7cf1824de2be0ca0a15a9db90dc4c975621ae26b0e535a63da57dd5231571d5913452bbf958b5c5522b1cf70f612c0dc6014", 0x2}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x101000) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x7) [ 842.271488][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 842.284572][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.291948][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:56 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) 16:51:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) 16:51:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000001f400"}, 0x1c) [ 842.318605][ T7798] kobject: '0:50' (00000000889521c6): kobject_uevent_env [ 842.333271][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 842.336996][ T7798] kobject: '0:50' (00000000889521c6): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 842.350761][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' 16:51:56 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 842.397982][ T7798] kobject: '0:50' (00000000889521c6): kobject_cleanup, parent (null) [ 842.398408][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env 16:51:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10b, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r1, &(0x7f0000000040), 0x0, 0x1}, 0x20) r2 = creat(&(0x7f0000000640)='./file0\x00', 0x100) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000980), 0x4) unlink(&(0x7f0000000940)='./file0\x00') r3 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r4 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r4, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000006c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000000100)={r5}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000003c0)={0xe, 0x0, &(0x7f0000000680)=[@acquire_done], 0xfffffffffffffeb3, 0x0, &(0x7f00000007c0)}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r6, &(0x7f00000007c0), 0x0}, 0x18) connect$rds(r6, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) r7 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4ec, 0x2001) ioctl$BINDER_THREAD_EXIT(r7, 0x40046208, 0x0) 16:51:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x2}, 0x4) [ 842.438336][ T7798] kobject: '0:50' (00000000889521c6): calling ktype release [ 842.446179][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 842.462620][ T7798] kobject: '0:50': free name [ 842.483647][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 842.514092][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 842.525095][T10030] binder: 10030 RLIMIT_NICE not set [ 842.525483][T10077] kobject: '0:50' (00000000482724a7): kobject_add_internal: parent: 'bdi', set: 'devices' [ 842.546230][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 842.554284][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 842.556585][T10077] kobject: '0:50' (00000000482724a7): kobject_uevent_env [ 842.568806][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.596200][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 842.601911][T10077] kobject: '0:50' (00000000482724a7): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 842.611409][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 842.624050][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 842.635254][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 842.642610][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 842.657919][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env 16:51:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_i\x90'}}) 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000fc00"}, 0x1c) 16:51:57 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) [ 842.665934][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 842.678118][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 842.692154][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 842.702961][ T7798] kobject: '0:50' (00000000482724a7): kobject_uevent_env 16:51:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x2000000000, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x800007, 0xb}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 842.719279][ T7798] kobject: '0:50' (00000000482724a7): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 842.754921][ T7798] kobject: '0:50' (00000000482724a7): kobject_cleanup, parent (null) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$kcm(0x10, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000640)=r1, 0x4) [ 842.759715][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 842.788855][ T7798] kobject: '0:50' (00000000482724a7): calling ktype release 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000080fe00"}, 0x1c) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) [ 842.829757][ T7798] kobject: '0:50': free name [ 842.839050][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:57 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:51:57 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x758, 0x9}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f00000007c0), 0x0}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) ptrace$setregset(0x4205, r1, 0x203, &(0x7f0000000240)={&(0x7f0000000200)="9b3cc9b1d544103189daeb1bf96214c63c0fc10c1e70ac669b007e07a9125080", 0x20}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x101, 0x4, 0x3, 0x400, 0x7}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r2, 0xfffffffffffffcae}, &(0x7f0000000100)=0x8) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:devicekit_power_exec_t:s0\x00', 0x2c, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x40840, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000300)={[], 0x445, 0x3, 0x9, 0x8, 0x10000, r1}) [ 842.894096][T10859] kobject: '0:50' (0000000022b21631): kobject_add_internal: parent: 'bdi', set: 'devices' [ 842.913214][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 842.936390][T10859] kobject: '0:50' (0000000022b21631): kobject_uevent_env 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) [ 842.945264][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 842.970112][T10859] kobject: '0:50' (0000000022b21631): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 842.988141][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000c0fe00"}, 0x1c) [ 843.012408][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 843.050355][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env 16:51:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x25}}) 16:51:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'batadv0\x00', 0x1}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00'}) 16:51:57 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, 0x0, 0x0) [ 843.085726][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 843.124471][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 843.147727][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 843.162751][ T7798] kobject: '0:50' (0000000022b21631): kobject_uevent_env [ 843.182040][ T7798] kobject: '0:50' (0000000022b21631): fill_kobj_path: path = '/devices/virtual/bdi/0:50' 16:51:57 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000ff00"}, 0x1c) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) [ 843.193899][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 843.206150][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 843.237131][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:57 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000080), 0x0, &(0x7f0000000140), 0x8) [ 843.255676][ T7798] kobject: '0:50' (0000000022b21631): kobject_cleanup, parent (null) [ 843.266689][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 843.289288][ T7798] kobject: '0:50' (0000000022b21631): calling ktype release 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) 16:51:57 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000fff00"}, 0x1c) 16:51:57 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 843.316248][ T7798] kobject: '0:50': free name [ 843.317219][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env [ 843.352002][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 843.363121][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 843.370423][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 843.398682][T11888] kobject: '0:50' (00000000848ab37d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 843.410014][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 843.418799][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 843.430670][T11888] kobject: '0:50' (00000000848ab37d): kobject_uevent_env [ 843.438403][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 843.457464][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 843.463642][T11888] kobject: '0:50' (00000000848ab37d): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 843.480843][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 843.489072][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 843.500092][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env 16:51:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x25}) 16:51:57 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffd5}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x2b7, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640), 0x4) 16:51:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 16:51:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="000000000000b8ff00"}, 0x1c) 16:51:57 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 843.507329][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 843.517900][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 843.525125][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 843.536256][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 843.545687][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' 16:51:57 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:57 executing program 0: socketpair$unix(0x1, 0x1000040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file1\x00') socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 843.567355][ T7798] kobject: '0:50' (00000000848ab37d): kobject_uevent_env [ 843.577642][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 843.582946][ T7798] kobject: '0:50' (00000000848ab37d): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 843.592505][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' 16:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000200"}, 0x1c) 16:51:58 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 843.634256][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 843.635047][ T7798] kobject: '0:50' (00000000848ab37d): kobject_cleanup, parent (null) [ 843.669027][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' 16:51:58 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:58 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 843.696635][ T7798] kobject: '0:50' (00000000848ab37d): calling ktype release [ 843.701297][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 843.723443][ T7798] kobject: '0:50': free name [ 843.727910][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 843.775475][ T3876] kobject: 'loop0' (00000000ebdb0ec8): kobject_uevent_env [ 843.791514][T12716] kobject: '0:50' (0000000051d161d7): kobject_add_internal: parent: 'bdi', set: 'devices' [ 843.798144][ T3876] kobject: 'loop0' (00000000ebdb0ec8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 843.804819][T12716] kobject: '0:50' (0000000051d161d7): kobject_uevent_env [ 843.822245][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 843.831192][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 843.842087][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 843.849353][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 843.854799][T12716] kobject: '0:50' (0000000051d161d7): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 843.861574][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env 16:51:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x2}}) 16:51:58 executing program 0: socketpair$unix(0x1, 0x1000040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file1\x00') socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 16:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="00000000000000000500"}, 0x1c) 16:51:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 16:51:58 executing program 4: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:58 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) semget(0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 843.889127][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 843.899844][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 843.907042][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 843.924316][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env 16:51:58 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:58 executing program 0: socketpair$unix(0x1, 0x1000040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file1\x00') socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 843.934764][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 843.948753][ T3876] kobject: 'loop1' (00000000a21e4c10): kobject_uevent_env [ 843.950220][ T7798] kobject: '0:50' (0000000051d161d7): kobject_uevent_env [ 843.959033][ T3876] kobject: 'loop1' (00000000a21e4c10): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 843.977920][ T7798] kobject: '0:50' (0000000051d161d7): fill_kobj_path: path = '/devices/virtual/bdi/0:50' 16:51:58 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 843.999113][ T7798] kobject: '0:50' (0000000051d161d7): kobject_cleanup, parent (null) [ 844.019201][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env 16:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000100"}, 0x1c) 16:51:58 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 844.050599][ T7798] kobject: '0:50' (0000000051d161d7): calling ktype release [ 844.055906][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 844.077654][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 844.083168][ T7798] kobject: '0:50': free name 16:51:58 executing program 0: socketpair$unix(0x1, 0x1000040000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200000, 0x0) symlink(&(0x7f0000000200)='./file1\x00', &(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000000c0)='./file1\x00') socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000040)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 844.105279][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 844.121500][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 844.139910][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 844.151217][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 844.159169][T13254] kobject: '0:50' (00000000b2bdfc8d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 844.161231][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 844.183072][ T3876] kobject: 'loop2' (0000000068f68ea7): kobject_uevent_env [ 844.188966][T13254] kobject: '0:50' (00000000b2bdfc8d): kobject_uevent_env [ 844.190416][ T3876] kobject: 'loop2' (0000000068f68ea7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 844.209062][T13254] kobject: '0:50' (00000000b2bdfc8d): fill_kobj_path: path = '/devices/virtual/bdi/0:50' [ 844.219475][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env [ 844.229507][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 844.242406][ T3876] kobject: 'loop3' (000000008492ab97): kobject_uevent_env 16:51:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [], 0x3}}) 16:51:58 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 16:51:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 16:51:58 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000100)='team0\x00\x00\x00\x00\x00\x00\x00 \x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@dellink={0x34, 0x11, 0x201, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'team0\x00'}]}, 0x34}}, 0x0) 16:51:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @rand_addr="0000000000000000000200"}, 0x1c) 16:51:58 executing program 2: msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00f8"], 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) [ 844.253030][ T3876] kobject: 'loop3' (000000008492ab97): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 844.276392][ T3876] kobject: 'loop4' (000000006cd7d9e4): kobject_uevent_env 16:51:58 executing program 4: symlink(0x0, &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) [ 844.297724][ T3876] kobject: 'loop4' (000000006cd7d9e4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 844.310240][ T7798] kobject: '0:50' (00000000b2bdfc8d): kobject_uevent_env [ 844.314016][ T3876] kobject: 'loop5' (0000000023f3e9a5): kobject_uevent_env [ 844.324503][ T3876] kobject: 'loop5' (0000000023f3e9a5): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 844.329110][ T7798] kobject: '0:50' (00