0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) r3 = semget(0x1, 0x0, 0x600) semctl$IPC_RMID(r3, 0x0, 0x0) 08:34:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:28 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$LOOP_CLR_FD(r3, 0x4c01) 08:34:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x60000000}, 0x28) 08:34:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x60, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/483], &(0x7f0000000280)='GPL\x00', 0x0, 0xffffffffffffff29, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:28 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$LOOP_CLR_FD(r3, 0x4c01) 08:34:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) socket$kcm(0x11, 0x3, 0x300) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)={0x18, r3, 0x321, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x158, r3, 0x500, 0x4ff, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x47bf49a6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK={0xc0, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbd4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2a6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd00}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x840}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f00000006c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x14002}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)={0x120, r3, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0xd0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6213}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x80084}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:28 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f00000002c0)) r2 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x81000000}, 0x28) 08:34:29 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) 08:34:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x543, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/483], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:30 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:30 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xba000000}, 0x28) 08:34:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a89fbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1f9c114fe0ffba403a15b220c517654a2bd74e29d082e4ecae8aab8f6bee47aff04f002e7040fa29c1e74efd210655cd56d9707fc6ce265016ade81a45b1590010b6e0fdf2312c5c548bbdcdd20401fa8db2c6c6aea9da8798398b77d7cccbfa4c6f05c695ba6e206db6e78297f039e53b456"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) r3 = semget(0x1, 0x0, 0x600) semctl$IPC_RMID(r3, 0x0, 0x0) 08:34:30 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xa00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 777.037529][ C0] net_ratelimit: 19 callbacks suppressed [ 777.037539][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 777.037810][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 777.043312][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 777.049542][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:31 executing program 3: r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x957, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}, 0x10, 0x0, r0}, 0x78) r2 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) mmap$snddsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0xe000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:31 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:31 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xd00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:31 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) [ 777.927871][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 777.934210][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 778.077526][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 778.083347][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) 08:34:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xbaffffff}, 0x28) [ 778.237540][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 778.243412][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) 08:34:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:32 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:32 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) 08:34:33 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:33 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) sendmmsg$alg(r3, &(0x7f0000001500)=[{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)="ded79b8a6a1c6230948c0018726c127dab90178e4121217f0900fd725e7556f8ef25e24d46a7af80ddfac20e5adb073c8dd8ba6db8fb60d9648058de594e75a9086827590932b47c46d7e5507e612bf56beb67499ddb4b46552ded5156b86c71a7533d7f27907d28a0808c8cde3a3e954065602219c08eb888e820879593e5a2b755e3b1d3d5cb2e05ea972a2e", 0x8d}, {&(0x7f00000000c0)="c8af9b9d91cd6714018a6a643020df9bd8251b509bde124de9ad27aedae2b75b37aee9ee3aa03ca31821a1b11cf833fba96b2d3edadeb554f250a58d01da4db21e5b4a91547ede80416f9845a8103849ce2beccc8fdfbd8e7ffa6b3740e9b7bc43f97df9d914381026dc329332", 0x6d}], 0x2, &(0x7f00000002c0)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0x1000}], 0x30, 0x40}, {0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000440)="02732948819d64f70e906889fac012453fcc719d3875399b6c5f3d9b2107c343bc40e64b14e66faff5bcb36247265dded268684c24896ae5fdcb77f685a5a68663e7a92d2cd50a4ba1e6106150c57fab4e2f2218ad2b786a601e2cdce87972594c247502f5d1d1ae90b6ef71e4f9dce87bf1bd8adc4d5fcdaaf51e0cb1554bfc16231f4473add3a58b8efb5ce2a6dbb54259777167bb4d31a751e1f268e415bc9b9a5e91221f9c10d0abba02f1856cda40935ca23ff472deda5760c47d1038a8", 0xc0}, {&(0x7f0000000500)="62c77cc200855cc71fdd38ecd2d045af1e5aae71aa05d8007f0caea77160274cd9772ef135c7e298ddb8b465862e762821948c8969d225d373385113dc18d8f4fdf05f1a7bc34df06339d212b852c1c2bf403ce720a1457306dc5421eb3a9f0667", 0x61}, {&(0x7f0000000580)="19687ac3694adb493aa96a386f21ec5ad1c9bd4df52bca8e2e845f4640e8aff487482d6004f79d181398e0923944ba162c6c205ced5fc224f502471e3cfbfa721f19e0fb269ef7d34d6189b14dbc6289cc0e6a1b70cac3522a5d25fa26b236579181273cf5f101d3ad280c8e0babbd4baef1d1e4294933fd9322b401caafe7e2deaecff2617ff5c350", 0x89}, {&(0x7f0000000640)="c3f145395d9f8934a322791a00c0e34bb186f0c8c8a9085c4a5ba83e0f9b514311fd650d8f67995d518942690cb16b1ed439aa4a4fbd52c1ada7ba898a29bc5efbc2656991726afbb97f69d15db92a20944fd267681e27182418c552ed29caf6504881b4995a438e60fb7f7a22f09c90edab0dcbc7dd30c46d7213950ba2f6e300e4c1ea9d5179a19f9cdd0d7a022e27c704fc14ce9364b6d0aeb24c4ea1ff8c0f4530aa0882e7ad43aaab5e1a86c12814d7a9b225bcd5a956ae720763c273e457b23496de7e577c1c2e623b8f8e47d4c6342b127f88c2cc639727", 0xdb}, {&(0x7f00000008c0)="c6721faf1d1b545df91dc29b98873694d139bbe1b609ec94013334eec9df4cc245ccaef5275142fcdaacdadaf14e0f747033d095c2f3ca138ffb189cfe6196f17e6e27ffe5be72bec8140d9fa6a45433ba96b7bed00b991e63f53ff864f8ab6628dd859087dbf1a19e452a92bc772524884d811b5e76393d2c6cec3eec4412f016cc6088c2b041bf7eeb9634506e36698b2d", 0x92}, {&(0x7f0000000300)="8139f521636c99e7514b", 0xa}, {&(0x7f0000000bc0)="ea9c1cb7d09fddafd01c1985f632efcf5a2ed6f7b27fe9575a5401633cf12a50bb548d65e7f367d7ee21c18f642695fd7d6e60ab6d55734ae716bd64b1dc49806950bec9536a2fdb86abcf5d4103c8dbad683b4dff5842c1c6f8789de4fac6b7f5b28efddb3cd6b7f72d25562584d9065acea3a56381bdfd1560b4ab2017270b7e76f7e3760cf0ef93f613bee293e182c7a967466b23f7014bd1ae3faf9926bef0331e8e02342fffc5dbee29bfbbeba4205d56773f99fabe060f", 0xba}, {&(0x7f0000000c80)="61c2c542740a7efc6b038c3f73f6f81b6067f28d6c72658ac193ffc420550d7256004c3fc655bb15c371cf8e6559ec04f53bc85250508a5a491cc9473e72600988ac9c2a23da9ae9d35373ecae02f402b78674f395e76c7423618b568ba6a4afb291eb92c09768691c7ba3d6c4255f1d6612be9f8dbbf6840e0b8cf0b374afb92f1de645fe22f905b1e4d4466690e0554d6d362c761c85a6832e9d4d9a40da0038e6c8bf6f53d89f78f9e25da405f2a013218ebbf2c75c9140f3a666aa7a73f72511e84b8a78ac274b2e01a8", 0xcc}, {&(0x7f0000000740)}], 0x9, &(0x7f0000007380)=ANY=[@ANYBLOB="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"], 0x10e5, 0x80}, {0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000e40)="d31ffeb6304fcdefb9e0a0be063537513557117226c0a8b34b38eac457ffe512010ca09ed4401e9bab3f6c713088c77c2b10c309928eda4ff2c298018c154846a3f797bce9555df23eda88e2abd0641f8b0900313a0bbe9c091695f50e2e198bc36b97fbca72b1aa7b797c9f58e32bcd2cff8ae05c7754783d8a4e5fd0da3b5269216a6836389751b9e687915651701a58f9943171c0ca1899ae98af635895963f86bd618acbd3826e4920b816192b414299cdadfe7185797736e8f6efbd6167e4dc5387cfffda2fa4245f0ec7c7128cb28cea1992765d84042cfa09ef17b41c", 0xe0}, {0x0}], 0x2, &(0x7f0000000f40)=[@iv={0x20, 0x117, 0x2, 0x6, "295df0d9738f"}, @op={0x18}, @iv={0x70, 0x117, 0x2, 0x56, "7a10cc5b179d7b4f0ab95f1db294ca563c6b15587b0ca08d76e74ddd4e78ef9048ea5e815e0773ff38dbcdae77b6b63ce5e3ea83240a13e4dba65dd3066d9684b0aa9189d4b82d7e16a51fbf494cdd3aba8bf90b1058"}, @iv={0x88, 0x117, 0x2, 0x71, "f4d5f37d44de61ad179131c2afabceeaa36c9f651238fa901d7bd0fae346282a2b0a0c3624aa783d5994ae83188cd39133606e45b94293f2669c1ec6bc79be40f54ab9f18c4319f96943f228f14278fb998cb36ff5413ebd050d74afcce644b4d9c52e17fc5eb4f2368f78edcd9c3fffb7"}, @iv={0xc8, 0x117, 0x2, 0xb0, "0c5e44e13bac5167b7306bb6f26e1dd29a5eef8f06872d9272c0679e49d016c5fc553ca3cbab8d63e586172ede4841fe904161a53b4d4716eaa574804e96dbb10a629f1cee9b6036ef49e8973d99e2c6e99045a7966b8832130f9633d16ccb4151bfa2f9426a7a37e65c3359fdd2f49bd8977a0a843f42dd63b64019a363b9cec8ef5178a85e223a3987c0cc1fdd645bf1380753f40029808b9fda9d4414d3a9ae93ac5166f732f0c8e4e31f1ffa7d12"}, @assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x228, 0x4000040}, {0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000001180)}, {&(0x7f00000011c0)="5450bc442477d8471de3e428351f53d2c205e3ece176dbe2a10c3843cbd4d3c1a69887a28de4a90100dbc61ba26abefb00d077455d2ae26e0f5e6eaf0b1845b0c70c2bb61d800c84b3bc1fc5fbb137916cbd2014d98609d2f64148ec0ebfe9c33181f742644837bc20543d7a443cc73d1cae6d6406a2895b15e413856dff2d03d1b6c2e76389af7ce7199425835626adab4f7c19ed6a96e86a754bbbca97f9da", 0xa0}], 0x2, &(0x7f0000002ec0)=[@iv={0x100, 0x117, 0x2, 0xe5, "d3c81d26fe6f648326fd1050096a47cbba795a8134e1301b50f26c59389f9e47c41f6a61440376c0b589917a2b3c8ff926477473684d7c36211816c2ea22624c993edc96afe8553a63c81dbeedcd7234c8c9b8c4985e7b70a836bfd298ff3e18418f1473a4736eb94e32b6f96f7b8d70551202a8dcf0398ebc1043b7dad76a26543c8fb89e69067a80a1ac4a042607a01da4911d57961686b0e7252cda847b81d45bac69f31c3323a41941fb6d9afbd6c3a07619583d8cb82bf6d26108d90566c922cc5f843b15ff0161bfca0eabb25a89767a2561b12910230bf2f6749c7c02013d4e4b74"}, @assoc={0x18, 0x117, 0x4, 0x200}, @op={0x18, 0x117, 0x3, 0x7dd169f374fedba3}, @assoc={0x18, 0x117, 0x4, 0x3}, @iv={0x78, 0x117, 0x2, 0x63, "9dbe9aec87c8857771fc794e3d5760786bf3fc24533b0f6be9d18bd3490a3e2cee984b69d80d1c1f96cf7bf81ac1c472baef1450a8aa633b59fca53a660a9d21ce130e0378896bef0bdef17f8f45b84ce82eb663b40c3b381f0129203b9697221b91e1"}, @iv={0xe0, 0x117, 0x2, 0xcb, "43d33d04db3cde27e850623551cd06089207bdd2c7ada7400ffed6d6d4d77fa85d65f6a90671c42d96ad88cbad8119ba018df6afd059cf5f63c1cc4582389473fe526c73bd2b6769dc225264862e86e69d6e9603f33de8c4f869fe409112d31ee0835b428e5de08aeefbb54ee950e0486b2f05a24f10e8c1a8fa466c9c8f5b5b89524141041be70c24db693bd1c65f71109cbcfb7fa4b8eb64792f3e66e2a4f49aaf7ce9c197c5ccf34f84b29720f559bec6c05d0a38370189e270ad58445c105b64a96315c89a8727ec9a"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}], 0x12b8, 0x84}, {0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000004180)="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", 0x1000}], 0x1, &(0x7f0000001300)=[@assoc={0x18}, @op={0x18}, @iv={0xb8, 0x117, 0x2, 0xa3, "af2eaf15483aa2ec2108c6111418bb1a6062e73eaef76a57da316df99d40e73cee0aba2a19471a633dfbee91594aa1e727065d95696eda00c1a55fef7623a1dca0bc991daae0f362abbcfe24b679463fe0e6d144daefe2d0d37cc4e5c271ed35dbc07a8126da24ab038e344d4d1c6bfc23fae2a7de741706a53a7aa1c31e02f9fec86876b3c816eaad832e87641961ecdd541c4450c95d729ecc0de8723f22955a6602"}, @op={0x18}], 0x100, 0x2000000}, {0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001400)="aab89eb8553336595e7b3fa390b2c318c069b32a5de337f8d29c02dc1ad5f1902f933534705a14524c5bb4a4696a059126a4063a2b9d97a6d3dab977a8b30b3e31c8a24b52765afbcc6e017f04ff50b8349a9c252e896e951ef81fe8529b6b3fe169c6ccc5c832791eb5860f52c8b4f01bdd96acd6b1c3da42b1e8874767867a7aa3d43ceedcfeee7bdd8c95459a8b08ce838ea8fb593d0604554f764e54eb2ff608bd9bbba6f51b12cdbc59", 0xac}], 0x1, &(0x7f0000005180)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x100, 0x117, 0x2, 0xe8, "ea04a001dc4697ab8a77bd498781a1dbaf39ae04e8f3bad0a8e1a514e7d01f592c9adf76908924064e000aa30cd2d6d31ed23f0fd3d821696fd6da0e73fcef0892a9ed8328101a9fd596ca24a4d950795691bc3a90bd8e3e59c68df8e47be2e04c9d7f7462e646c1c1b2a79f93c6e93ea4cf2e291b6f94f05b5fdeb8ce526a1f5da76264948105600cbb839b2288c821865988d3ee103fa69d14d1feb671222f13e355480def6a227bdb8026bcc82909ba69df713842d002e5ab67bc91b17c83cd31c52e425511cd0a85a719cd3a5975feca58c4214fa308e5852679f5adc8b8a5c250ea1d7133bc"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x5b}, @assoc={0x18, 0x117, 0x4, 0x9}, @assoc={0x18, 0x117, 0x4, 0x7}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @assoc={0x18, 0x117, 0x4, 0x7fffffff}], 0x21d8, 0x8}], 0x6, 0x20000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xf2ffffff}, 0x28) 08:34:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:33 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:33 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4305, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:34 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) 08:34:34 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:34 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) 08:34:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r2, 0xc2604110, &(0x7f0000000380)={0x0, [[0x6a7f, 0x100, 0x1000, 0x4, 0x3, 0x3f, 0x20000, 0x1], [0x3, 0x6, 0x3, 0x1a, 0x5, 0x8, 0x1, 0x7ff], [0x6, 0x4, 0x1000, 0x7f, 0x3, 0x101, 0x2, 0x3f]], [], [{0x8, 0x4, 0x1, 0x0, 0x1}, {0x4f6, 0x5, 0x1, 0x1, 0x1, 0x1}, {0x22, 0x20, 0x1}, {0x3, 0x5, 0x0, 0x1, 0x1, 0x1}, {0x400, 0x80, 0x0, 0x1}, {0x6, 0x100, 0x1, 0x1}, {0xffffffff, 0x100, 0x0, 0x0, 0x0, 0x1}, {0x80000000, 0x5, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x0, 0x1}, {0x3, 0x4, 0x0, 0x0, 0x1}, {0x7, 0x5, 0x0, 0x1, 0x0, 0x1}, {0x8, 0xffffff81, 0x0, 0x0, 0x0, 0x1}], [], 0x6}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xfeffffff}, 0x28) 08:34:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:34 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x6000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:35 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r5, 0x40086432, &(0x7f00000001c0)=0x81) 08:34:35 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:35 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) 08:34:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r0, 0xc0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x6, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x2, 0x4, 0xff, 0xff}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x4}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xfffffe70, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x0, r2}, 0x48) perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xffff8000}, 0x28) [ 782.077510][ C1] net_ratelimit: 18 callbacks suppressed [ 782.077520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 782.089392][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0xb3, 0x20a80) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000100)) write$binfmt_misc(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xe6) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:36 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 782.237544][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 782.243338][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 782.397816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 782.404375][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 782.410927][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 782.417125][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:36 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:36 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:37 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:37 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 783.277534][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 783.277564][ C1] protocol 88fb is buggy, dev hsr_slave_0 08:34:37 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x81, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x2a01, 0x852}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101800, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000100)) 08:34:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xffff8100}, 0x28) 08:34:37 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2, &(0x7f00000009c0)=ANY=[@ANYRESHEX], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:38 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x80ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:38 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xfffff000}, 0x28) 08:34:38 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:39 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:39 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x20000072, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) ioctl$void(r0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r3, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000100)=0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x81ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:39 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:39 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:39 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xffffffba}, 0x28) 08:34:40 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0xffffffffffffffff, &(0x7f00000000c0)=""/57) r1 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) r2 = socket$kcm(0x11, 0x3, 0x300) r3 = creat(0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x2) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) connect$rose(r3, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80), 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xc, 0x1a4, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x43, 0x0, &(0x7f00000002c0)="f1bab3312f5f68be14db898b24b9eb3b9b46066c93c0e9fc79ad9f762851a132be30cc805da53718ee0ffa739b5d4f07af1301bfb3a10b6cd355065a07000000000000"}, 0x40) 08:34:40 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab8d543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) r5 = creat(0x0, 0x0) r6 = accept(r3, &(0x7f00000002c0)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000100)=0x80) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x0, 0x2}, &(0x7f0000000380)=0x8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$inet6_icmp_ICMP_FILTER(r5, 0x1, 0x1, &(0x7f00000000c0)={0x5}, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x1c, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) syz_open_dev$cec(&(0x7f0000000640)='/dev/cec#\x00', 0x1, 0x2) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) preadv(r5, &(0x7f00000003c0)=[{&(0x7f0000000500)=""/166, 0xa6}], 0x1, 0x2000000000000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r7, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) r8 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x80000001, 0x401000) write$FUSE_NOTIFY_POLL(r8, &(0x7f0000000600)={0x18, 0x1, 0x0, {0x9fc}}, 0x18) 08:34:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf0ffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:40 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:40 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:41 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xfffffff2}, 0x28) [ 787.437509][ C1] net_ratelimit: 22 callbacks suppressed [ 787.437519][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 787.437704][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 787.443672][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 787.449529][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:41 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:41 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r0}, 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(0x0, 0x0) r4 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x20000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xfffffffffffffe57) write$P9_RSTATu(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="640000007de8dc35157c6ef00e70c8fb139402653f004f000600060000004400000000010000000000000000000100000000006000000000020000000000000000040047504c001400292d747275737465642363706f7365", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7], 0x64) syz_open_dev$midi(&(0x7f0000000600)='/dev/midi#\x00', 0x7fffffff, 0x841) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f00000000c0)=0xad36a17b3ec015a8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x1000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:42 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 788.317521][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 788.323314][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 788.477538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 788.483800][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:42 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 788.637522][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 788.643310][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xfffffffe}, 0x28) 08:34:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:42 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:43 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x4000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:43 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:43 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:43 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000400)={0x7, 0x5, 0x4, 0xe000, 0x200, {0x0, 0x7530}, {0x1, 0xa, 0x6, 0x18, 0x4, 0x4, "6f9528da"}, 0x4, 0x2, @fd, 0x74f, 0x0, r1}) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000540)) r3 = socket$kcm(0x11, 0x3, 0x300) r4 = accept(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@proc, &(0x7f0000000100)=0x80) connect$unix(r4, &(0x7f0000000380)=@abs={0xbf378acdc3b65e55, 0x0, 0x4e23}, 0x6e) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r5 = socket(0x200000000000011, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bind$packet(r5, &(0x7f0000000240)={0x11, 0x0, r7}, 0x14) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000040)=0x10eef0f1) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x2d, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, [], r8}, 0x3c) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r9, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) r10 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x101000, 0x0) ioctl$SNDCTL_DSP_SETDUPLEX(r10, 0x5016, 0x0) 08:34:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xffffffff}, 0x28) 08:34:44 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x5430000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:44 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:44 executing program 3: r0 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000d00)={0x1, 0x7, 0x4, 0x48, 0x5, {0x0, 0x2710}, {0x4, 0x0, 0x9, 0x81, 0x3, 0x6, "1840d1d9"}, 0x10000, 0x3, @userptr=0x2, 0x8, 0x0, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x70, 0x3, 0x8, 0x1, 0x70bd2a, 0x25dfdbfb, {0x5, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x40000000}, @CTA_TIMEOUT_DCCP_OPEN={0x8}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x3dc}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8106}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r3 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r2, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x9f, 0x0, &(0x7f0000000500)="0afbdc8c323e5e5eb88d1245e472a589fe6f5df36a33fdd1fef674c94e37b5e34dccc0431fb431fa57c170b87bd03c080c10dbaee12e0cf311b627c9e205b26a8df5eff9e095f9fca221ad253d96dd88c71d7b1ab65a33dda99bffe552b8687c5c77bf4a0126c1ab534ea1c75ed05dd03f5b326f7dddf7cd67f14384e4c6026efb08ee4ade760c6aef2dbefc3e1711ea11f891a9d11021ee7269699b0cf6bc"}, 0x40) r5 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r7, 0x42b}, 0x40}}, 0x0) recvmsg$can_raw(r5, &(0x7f0000000cc0)={&(0x7f0000000700)=@sco, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000008c0)=""/13, 0xd}, {&(0x7f0000000900)=""/136, 0x88}], 0x2, &(0x7f0000000c00)=""/181, 0xb5}, 0x40000000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000380)=0x9, 0x4) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x30, r7, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x4, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4001000}, 0x10) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f00000000c0)={0x3, 0x1}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x746, 0x5, 0x8000, 0x1ff, 0x40, 0x3ff, 0x2, {0x0, @in6={{0xa, 0x4e23, 0xfffffff7, @rand_addr="b2e7b6b3e145ee3af25df006aa9bfbf9", 0x3}}, 0xe7, 0x200, 0x7, 0x7, 0xb62}}, &(0x7f00000003c0)=0xb0) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r9, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r10, r9}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) keyctl$assume_authority(0x10, r10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000680)={r8, 0x80000001}, &(0x7f00000006c0)=0x8) 08:34:44 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:45 executing program 1: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:45 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x8000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:45 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:45 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:46 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:46 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xa000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 792.477509][ C1] net_ratelimit: 14 callbacks suppressed [ 792.477518][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 792.488951][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 792.637519][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.643309][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 792.797746][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.803750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 792.810022][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 792.816082][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x2}, 0x28) 08:34:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xd000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 793.677525][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 793.678351][ C1] protocol 88fb is buggy, dev hsr_slave_0 08:34:47 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = getuid() setreuid(0x0, r1) mount$9p_unix(&(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000800)='9p\x00', 0x3b1d34692914186f, &(0x7f0000000980)={'trans=unix,', {[{@cache_none='cache=none'}, {@cache_loose='cache=loose'}, {@fscache='fscache'}, {@access_user='access=user'}, {@aname={'aname', 0x3d, 'HL\x00'}}, {@access_user='access=user'}, {@access_client='access=client'}], [{@euid_eq={'euid', 0x3d, r1}}, {@uid_lt={'uid<'}}, {@subj_user={'subj_user', 0x3d, 'cgroup.subtree_control\x00'}}, {@obj_user={'obj_user', 0x3d, 'cgroup2\x00'}}]}}) mount$9p_virtio(&(0x7f0000000100)='syz\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x40000, &(0x7f0000000380)={'trans=virtio,', {[{@posixacl='posixacl'}, {@fscache='fscache'}, {@cache_mmap='cache=mmap'}, {@afid={'afid', 0x3d, 0x2}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '&'}}, {@euid_eq={'euid', 0x3d, r1}}]}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) connect$pppoe(r3, &(0x7f00000000c0)={0x18, 0x0, {0x3, @random="9c12e2c0b1c6", 'dummy0\x00'}}, 0x1e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:48 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:48 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x4}, 0x28) 08:34:48 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7fff}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:48 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:48 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:49 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x60000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) mq_notify(r2, &(0x7f0000000100)={0x0, 0x3f, 0x2, @thr={&(0x7f00000000c0)="31a1c2bb734d92f3fceb26819b8c6ea63fc913bc7bd7e5ba5f81e9770cf579f01211afc1bcd7127575bf0f", &(0x7f00000002c0)="dd716019489347129b2bceabbde5e94fbe9fdcf69594b86362f751320fd66ea2e39300c3c0d9f29f19500b64bf26ae9c78e5917ff6f995b4c777b9f39f339135cd593e8bf6190ee013f5eaab593f9477f7e8a1bd25fc106a2f7290e4edd9f1f274874d7bfc848d41f20e061f1cc267ab"}}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) socket$inet_dccp(0x2, 0x6, 0x0) 08:34:49 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:49 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x8}, 0x28) 08:34:49 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) recvfrom$netrom(0xffffffffffffffff, &(0x7f00000000c0)=""/35, 0x23, 0x40, 0x0, 0x0) 08:34:50 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x81000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:50 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:50 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000002c0)) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', 0x0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:50 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000bc0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffc, 0x4}, 0x10, r2}, 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xa}, 0x28) 08:34:51 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x7, 0x200a00) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, 0x0}, 0x0) socket$kcm(0xa, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x60) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xfffffffffffffe6b, &(0x7f000062b000)=""/4096, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x258}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0x0, 0x0}, 0x10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) r4 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) getsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:51 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xbaffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:51 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:51 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 797.837531][ C1] net_ratelimit: 22 callbacks suppressed [ 797.837540][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 797.837546][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 797.854701][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf2ffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xd}, 0x28) 08:34:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r0 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001d80), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:52 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:52 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 798.717506][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 798.723282][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x1e, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 798.877532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 798.883330][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:53 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 799.037518][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 799.043453][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 799.049267][ C0] protocol 88fb is buggy, dev hsr_slave_0 08:34:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfeffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:53 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:53 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xe}, 0x28) 08:34:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) r4 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r4, 0x0, 0x0) sendmsg(r4, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) r5 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$CAPI_GET_PROFILE(r5, 0xc0404309, &(0x7f0000000100)=0x4) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000600)={r7, 0x1}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000380)={r7, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f00000000c0)=0x84) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:54 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:54 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2d, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffff8000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:54 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:54 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"/651], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/vcsa\x00', 0x400000, 0x0) r5 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r5, 0x0, 0x0) sendmsg(r5, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000600)={r7, 0x1}, &(0x7f0000000640)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000d80)={r7, 0x400, 0xe9, "473957d7ba006957342eaed704ee72ed7cf025db7ad0311a73a2164428764cbdb781deeb4d9b606b25e9f4f6135ece59f980e347b0f4fc711172e48e579c490b7b60bdc3bbef370c213b620e0b09ee177c460a53a186c38c6c029905d31cf5e4043655b1be0c261909de836fa9afd4dc94b04f7cac08e271132b3ba768a25ae4354ec85c944af4abbd0c7a2721663f6c3ab0ebf1c133b3152e4c37d1a2542fdd7bf34b12cca98f3cc8c591c95587f40ada80a3cf88b8c5c199ed214191c1e6a19f960806cc57acd3cd75cdae71b938583f53182e6a6dd80b73a21c76ecb02cd72ee2a7aa0f7015805b"}, 0xf1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x60}, 0x28) 08:34:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffff8100, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3f, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f00000000c0)={0xd7f, 0x0, 0x80, 0x9}, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2d, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffff000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:55 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/483], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/meminfo\x00', 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r3, 0xc004aea7, &(0x7f0000000100)=0x400) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80007, 0x7) fcntl$dupfd(r4, 0x0, r5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xba}, 0x28) 08:34:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:56 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2d, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffffffba, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 802.877505][ C1] net_ratelimit: 17 callbacks suppressed [ 802.877514][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 802.888955][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:34:56 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 803.037517][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 803.043292][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r1 = getpid() ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000380)={0xffbffff, 0x4, 0x10000, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x9a090b, 0x0, [], @ptr=0xb9a000000000}}) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x3, 0x7, 0x3, 0x9, 0x0, 0x200, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000100), 0x1}, 0x20081, 0x8, 0x8, 0x7, 0x2, 0x9}, r1, 0xc, r2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYRES32=0x0], &(0x7f0000000340)='GPL\x00', 0x0, 0x8b, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffe}, 0x0, 0x10, &(0x7f00000000c0)={0x1}, 0xfef6}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x334, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x30948, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 803.197725][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 803.203754][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 803.210082][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 803.216134][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:34:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffff2, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:57 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:57 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xf0}, 0x28) 08:34:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3f, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB="44ff9ed4316f60f0cf5ef2aea42ba03adf785535ac776045da8c4ac9e41e3d4ae62f123a14045fc1b979e84a2071595906ff969d37e78733e598484ac402d151b844257118470d05106faa1721413f06a6467d4c25ad93980403b6566898cef485e2171489a0c5ca92c2c42c4d842bdb049766e13e32be12d8234a7f94801bed292fd2ecd36e6d96f2e2b2db4af3043a52a7c83acc140e265352fb51205a408995f316f5e83cfeb1c3aae0ad634b8fa7ac0cec08e3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r4 = creat(0x0, 0x8) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$TCGETS2(r4, 0x802c542a, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x34, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:57 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:57 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"/483], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x23, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x2}, 0x78) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000bc0)=""/4096) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 804.077911][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 804.078282][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 804.160770][T25028] fuse: Invalid rootmode 08:34:58 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:58 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x543}, 0x28) 08:34:58 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xffffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 804.795741][T25047] fuse: Invalid rootmode 08:34:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x34, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:59 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:34:59 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, 0x0, &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 805.285076][T25065] fuse: Invalid rootmode 08:34:59 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:59 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:34:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xd, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xa00}, 0x28) 08:35:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x34, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xf2ffffff, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe80, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:00 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:00 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) r2 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x7, 0x200a00) ioctl$NS_GET_USERNS(r2, 0xb701, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x5}, 0x80, 0x0}, 0x0) socket$kcm(0xa, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x60) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000300)=@framed={{0x18, 0x2}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xfffffffffffffe6b, &(0x7f000062b000)=""/4096, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x258}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r3, 0x0, 0x26c, 0x0, &(0x7f0000000080)="020043d05d25b666cd783f4b231c", 0x0, 0x8e}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0x0, 0x0}, 0x10) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0xf800000000000000) r4 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r4, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) getsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r5, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x38, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 807.263857][T25125] fuse: Invalid rootmode 08:35:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xd00}, 0x28) 08:35:01 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:01 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0x2000008e, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 807.843921][T25147] fuse: Invalid rootmode 08:35:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:02 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 808.237525][ C0] net_ratelimit: 18 callbacks suppressed [ 808.237534][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 808.237540][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 808.237564][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 808.243228][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 808.334717][T25160] fuse: Invalid rootmode 08:35:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x38, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:02 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(0x0, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xe00}, 0x28) 08:35:02 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:03 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xe000000, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 809.117531][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 809.123350][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:35:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 809.277521][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 809.283307][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:03 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, 0x0) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 809.437520][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 809.443301][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x38, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x2, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:03 executing program 3: r0 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000d00)={0x1, 0x7, 0x4, 0x48, 0x5, {0x0, 0x2710}, {0x4, 0x0, 0x9, 0x81, 0x3, 0x6, "1840d1d9"}, 0x10000, 0x3, @userptr=0x2, 0x8, 0x0, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x70, 0x3, 0x8, 0x1, 0x70bd2a, 0x25dfdbfb, {0x5, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x40000000}, @CTA_TIMEOUT_DCCP_OPEN={0x8}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x3dc}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8106}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r3 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r2, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x9f, 0x0, &(0x7f0000000500)="0afbdc8c323e5e5eb88d1245e472a589fe6f5df36a33fdd1fef674c94e37b5e34dccc0431fb431fa57c170b87bd03c080c10dbaee12e0cf311b627c9e205b26a8df5eff9e095f9fca221ad253d96dd88c71d7b1ab65a33dda99bffe552b8687c5c77bf4a0126c1ab534ea1c75ed05dd03f5b326f7dddf7cd67f14384e4c6026efb08ee4ade760c6aef2dbefc3e1711ea11f891a9d11021ee7269699b0cf6bc"}, 0x40) r5 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r7, 0x42b}, 0x40}}, 0x0) recvmsg$can_raw(r5, &(0x7f0000000cc0)={&(0x7f0000000700)=@sco, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000008c0)=""/13, 0xd}, {&(0x7f0000000900)=""/136, 0x88}], 0x2, &(0x7f0000000c00)=""/181, 0xb5}, 0x40000000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000380)=0x9, 0x4) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x30, r7, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x4, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4001000}, 0x10) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f00000000c0)={0x3, 0x1}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x746, 0x5, 0x8000, 0x1ff, 0x40, 0x3ff, 0x2, {0x0, @in6={{0xa, 0x4e23, 0xfffffff7, @rand_addr="b2e7b6b3e145ee3af25df006aa9bfbf9", 0x3}}, 0xe7, 0x200, 0x7, 0x7, 0xb62}}, &(0x7f00000003c0)=0xb0) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r9, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r10, r9}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) keyctl$assume_authority(0x10, r10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000680)={r8, 0x80000001}, &(0x7f00000006c0)=0x8) 08:35:03 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x3f00}, 0x28) 08:35:04 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x4, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3a, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd859"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:04 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:05 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x8, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:05 executing program 3: r0 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000d00)={0x1, 0x7, 0x4, 0x48, 0x5, {0x0, 0x2710}, {0x4, 0x0, 0x9, 0x81, 0x3, 0x6, "1840d1d9"}, 0x10000, 0x3, @userptr=0x2, 0x8, 0x0, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000e80)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x1080000}, 0xc, &(0x7f0000000e40)={&(0x7f0000000dc0)={0x70, 0x3, 0x8, 0x1, 0x70bd2a, 0x25dfdbfb, {0x5, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x40000000}, @CTA_TIMEOUT_DCCP_OPEN={0x8}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0x3dc}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x4}]}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x100}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8106}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r3 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001d80)=r2, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x9f, 0x0, &(0x7f0000000500)="0afbdc8c323e5e5eb88d1245e472a589fe6f5df36a33fdd1fef674c94e37b5e34dccc0431fb431fa57c170b87bd03c080c10dbaee12e0cf311b627c9e205b26a8df5eff9e095f9fca221ad253d96dd88c71d7b1ab65a33dda99bffe552b8687c5c77bf4a0126c1ab534ea1c75ed05dd03f5b326f7dddf7cd67f14384e4c6026efb08ee4ade760c6aef2dbefc3e1711ea11f891a9d11021ee7269699b0cf6bc"}, 0x40) r5 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0xe, &(0x7f00000000c0)={&(0x7f0000000000)={0x40, r7, 0x42b}, 0x40}}, 0x0) recvmsg$can_raw(r5, &(0x7f0000000cc0)={&(0x7f0000000700)=@sco, 0x80, &(0x7f0000000bc0)=[{&(0x7f00000008c0)=""/13, 0xd}, {&(0x7f0000000900)=""/136, 0x88}], 0x2, &(0x7f0000000c00)=""/181, 0xb5}, 0x40000000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000380)=0x9, 0x4) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x30, r7, 0x4, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x4, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4001000}, 0x10) setsockopt$CAIFSO_REQ_PARAM(r5, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) ioctl$USBDEVFS_CLEAR_HALT(r5, 0x80045515, &(0x7f00000000c0)={0x3, 0x1}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000005c0)={0x0, 0x746, 0x5, 0x8000, 0x1ff, 0x40, 0x3ff, 0x2, {0x0, @in6={{0xa, 0x4e23, 0xfffffff7, @rand_addr="b2e7b6b3e145ee3af25df006aa9bfbf9", 0x3}}, 0xe7, 0x200, 0x7, 0x7, 0xb62}}, &(0x7f00000003c0)=0xb0) r9 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r9, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r9, r10, r9}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) keyctl$assume_authority(0x10, r10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000680)={r8, 0x80000001}, &(0x7f00000006c0)=0x8) 08:35:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x4000}, 0x28) 08:35:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:05 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3a, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xa, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xd, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3a, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 813.278167][ C1] net_ratelimit: 18 callbacks suppressed [ 813.283947][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 813.290476][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 813.437518][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.443311][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 813.597783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.604015][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 813.610323][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 813.616292][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:07 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x4305}, 0x28) 08:35:07 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:07 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xe, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 814.478121][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 814.484316][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:08 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0xfeffffff}, 0x28) 08:35:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x60, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x6000}, 0x28) 08:35:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:09 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:09 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xf0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:10 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:10 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x8100}, 0x28) 08:35:10 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x543, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:11 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:11 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:11 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) 08:35:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xa00, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:11 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xba00}, 0x28) 08:35:11 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:12 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:12 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) 08:35:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:12 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 818.637814][ C0] net_ratelimit: 22 callbacks suppressed [ 818.637838][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 818.648107][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 818.649480][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 818.655602][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:35:12 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xd00, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:13 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:13 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x588bfc615e36f2ea, 0x0) 08:35:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xf000}, 0x28) 08:35:13 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 819.527513][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 819.533324][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:35:13 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:13 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 819.677540][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 819.683551][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad1"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) [ 819.838257][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 819.844653][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:13 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xe00, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x80ffff}, 0x28) 08:35:14 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x4305, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:15 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:15 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x81ffff}, 0x28) 08:35:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x6000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:16 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:16 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:16 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:16 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:16 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:17 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x8100, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:17 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0xf0ffff}, 0x28) 08:35:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:17 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 823.677549][ C1] net_ratelimit: 18 callbacks suppressed [ 823.677559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 823.688990][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:35:17 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 823.837543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 823.843318][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 823.997960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 824.004247][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 824.010736][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 824.016697][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:35:18 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xf000, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:18 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:18 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x1000000}, 0x28) 08:35:18 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:18 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 824.877529][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 824.878509][ C0] protocol 88fb is buggy, dev hsr_slave_0 08:35:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x80ffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:19 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x81ffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="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", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400, 0x0, 0x0, 0x2000000}, 0x28) 08:35:19 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3c, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = creat(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f0000000400)="3a2fd47265207d6bff474790589fc63ad8a53290774693c8da1b859ea27f87f4c3a2335ad217b1d95bd05fbbcbbac032ffd28e507e186f8994f701f5d6666504563cdc0bd9ccaccf8bd8c07fe721c8b2dc9e6482ad1735daf616888b396ac203d910bbdfd78102eccc0125b6ea79c59d0d8962cc7ba9736b82de2313a1b9cd39e8d09849a6815e2c95d4248962b85734cec2637d407a026bb3b9233b924bab946b62ee1e56eb016bd28beb66b03266945b4e9d8b4d665e03401a29184dbe9f1c7db0e99dea19d540e6f27bf2469f3e062ee3fe9b38147c1b77c0483a519fea916d9edb6bffeb5db4d7f00364af05ae0841f6acf68f3d1eea8965672b25cab2", 0xff) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x6}, 0x8) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0xba00, 0xe, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:20 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@euid_eq={'euid'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) 08:35:20 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000031feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002e000000b7000000000000009500000000000000f93ca877f9fba519d10547024aa4c378123096c0a97598d6daf89e26f62aa7c610a02281110b2a19ab543f686bda385e8f45e9de41ec7cef4b5b566ec7437a8d0fcf73ddbf851efee52738983633927170c430a0a13068c08fcf8cca7c7e742927e5154c7fc581c1151046ff291c3d8ea2a2771e87f8378d2119b9e3a8b626f95e03b8af08139e12327245e2983a303b94def21b95cfa862380537ad27c151f6551d81cae1bc58f518bb5d5d420d9a507382dc157df42dd330bf09658ef32bb8f8e40a34026166977958708f7a08c74fcef2e65a52d27d016834702a84aed281594a782545812c6fe8233804f2a1dfff862e5d00b4f370d69c3aef714b858a8cfbf1753fc900fbb0e11dd680618bc69104d380c46e20baf0308fa9bf6c540fd1b7ac6024591faa66938d496f48611c97dbd9945cd38c8a5353eaf663b9db3a0031ff03cde3c9727cdb67e63d342082ab2b14064ec8452c33c090e3c390dd4f86073bd8592d8bd748dbdc98d198648ad12749e1"], &(0x7f0000000280)='GPL\x00'}, 0x48) r1 = socket$kcm(0x11, 0x3, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000001d80)=r0, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r2, 0x0, 0xe, 0xf0ffff, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3", 0x0, 0x400}, 0x28) 08:35:21 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='fuse\x00', 0x939f6a809c2ab3af, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}], [{@obj_user={'obj_user', 0x3d, '$em0eth0'}}, {@uid_lt={'uid<'}}, {@fsname={'fsname', 0x3d, ')}#eth1\'vmnet1'}}]}}) chown(&(0x7f0000000240)='./file0\x00', r0, r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1100082) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x14, 0x0, "0eb61538a462ee812ba43ffc89bf1173dc3d06375d14638fb21b49d26972d96ef0b4b2e6d730ad6a7562b478c2974a9896747dccb30e7f63a1b51ec059554277", "1d0e47f158fae68f4d2aa224439c30eb3b3e468dfc3035d92c0929eeee707650bb008bd2cfa188d8954a0ede9661149d95659eff1ce2212f115951f98f736335", "3edea3fa98ed88e7de49fc2596c78e888e955cdca02efa85c8116766d8f71310", [0x4]}) [ 827.166086][T25773] ================================================================== [ 827.174351][T25773] BUG: KCSAN: data-race in batadv_tt_local_add / batadv_tt_local_add [ 827.182783][T25773] [ 827.185131][T25773] read to 0xffff888098cabe98 of 2 bytes by task 25744 on cpu 1: [ 827.192781][T25773] batadv_tt_local_add+0x11e/0x1200 [ 827.197995][T25773] batadv_interface_tx+0x398/0xbe0 [ 827.203119][T25773] dev_hard_start_xmit+0xef/0x430 [ 827.208159][T25773] __dev_queue_xmit+0x14e9/0x1ba0 [ 827.213183][T25773] dev_queue_xmit+0x21/0x30 [ 827.217693][T25773] __bpf_redirect+0x4b4/0x710 [ 827.222486][T25773] bpf_clone_redirect+0x1a5/0x1f0 [ 827.227521][T25773] bpf_prog_bb15b996d00816f9+0x400/0x1000 [ 827.233244][T25773] bpf_test_run+0x1c3/0x490 [ 827.237843][T25773] bpf_prog_test_run_skb+0x511/0x8a0 [ 827.243144][T25773] __do_sys_bpf+0xf77/0x3150 [ 827.247755][T25773] __x64_sys_bpf+0x4c/0x60 [ 827.252179][T25773] do_syscall_64+0xcc/0x3a0 [ 827.256697][T25773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 827.262595][T25773] [ 827.264935][T25773] write to 0xffff888098cabe98 of 2 bytes by task 25773 on cpu 0: [ 827.272666][T25773] batadv_tt_local_add+0x21e/0x1200 [ 827.277870][T25773] batadv_interface_tx+0x398/0xbe0 [ 827.282988][T25773] dev_hard_start_xmit+0xef/0x430 [ 827.288023][T25773] __dev_queue_xmit+0x14e9/0x1ba0 [ 827.293314][T25773] dev_queue_xmit+0x21/0x30 [ 827.297827][T25773] __bpf_redirect+0x4b4/0x710 [ 827.302525][T25773] bpf_clone_redirect+0x1a5/0x1f0 [ 827.307575][T25773] bpf_prog_bb15b996d00816f9+0x3f4/0x1000 [ 827.313307][T25773] bpf_test_run+0x1c3/0x490 [ 827.317817][T25773] bpf_prog_test_run_skb+0x511/0x8a0 [ 827.323118][T25773] __do_sys_bpf+0xf77/0x3150 [ 827.327728][T25773] __x64_sys_bpf+0x4c/0x60 [ 827.332150][T25773] do_syscall_64+0xcc/0x3a0 [ 827.336663][T25773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 827.342721][T25773] [ 827.345047][T25773] Reported by Kernel Concurrency Sanitizer on: [ 827.351218][T25773] CPU: 0 PID: 25773 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 827.359895][T25773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.370997][T25773] ================================================================== [ 827.379068][T25773] Kernel panic - not syncing: panic_on_warn set ... [ 827.385753][T25773] CPU: 0 PID: 25773 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 827.394434][T25773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.404484][T25773] Call Trace: [ 827.407788][T25773] dump_stack+0x11d/0x181 [ 827.412135][T25773] panic+0x210/0x640 [ 827.416040][T25773] ? vprintk_func+0x8d/0x140 [ 827.420650][T25773] kcsan_report.cold+0xc/0xd [ 827.425248][T25773] kcsan_setup_watchpoint+0x3fe/0x460 [ 827.430654][T25773] __tsan_unaligned_write2+0xc7/0x110 [ 827.436044][T25773] batadv_tt_local_add+0x21e/0x1200 [ 827.441253][T25773] ? __const_udelay+0x36/0x40 [ 827.445949][T25773] batadv_interface_tx+0x398/0xbe0 [ 827.451085][T25773] dev_hard_start_xmit+0xef/0x430 [ 827.456131][T25773] __dev_queue_xmit+0x14e9/0x1ba0 [ 827.461171][T25773] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.466913][T25773] ? skb_release_data+0x267/0x3a0 [ 827.471963][T25773] ? pskb_expand_head+0x353/0x870 [ 827.476992][T25773] ? __write_once_size+0x5a/0xe0 [ 827.481951][T25773] dev_queue_xmit+0x21/0x30 [ 827.486476][T25773] __bpf_redirect+0x4b4/0x710 [ 827.491180][T25773] ? skb_ensure_writable+0xa2/0x290 [ 827.496419][T25773] bpf_clone_redirect+0x1a5/0x1f0 [ 827.501468][T25773] bpf_prog_bb15b996d00816f9+0x3f4/0x1000 [ 827.507204][T25773] ? audit_tag_tree+0x860/0xca0 [ 827.512102][T25773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.518353][T25773] ? __this_cpu_preempt_check+0x45/0x140 [ 827.524093][T25773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.530345][T25773] ? __perf_event_task_sched_in+0x14d/0x390 [ 827.536249][T25773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.542500][T25773] ? __perf_event_task_sched_out+0x14d/0xb00 [ 827.548496][T25773] ? _raw_spin_unlock_irq+0x68/0x80 [ 827.553703][T25773] ? finish_task_switch+0x7b/0x260 [ 827.558834][T25773] ? preempt_count_add+0x6f/0xb0 [ 827.563798][T25773] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 827.569614][T25773] ? rcu_preempt_deferred_qs_irqrestore+0x34f/0x580 [ 827.576217][T25773] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 827.582137][T25773] ? __read_once_size+0x5a/0xe0 [ 827.587005][T25773] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 827.592759][T25773] ? ktime_get+0x1c4/0x210 [ 827.597191][T25773] ? constant_test_bit+0x12/0x30 [ 827.602149][T25773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 827.608396][T25773] bpf_test_run+0x1c3/0x490 [ 827.612930][T25773] bpf_prog_test_run_skb+0x511/0x8a0 [ 827.618232][T25773] ? bpf_test_init.isra.0+0x240/0x240 [ 827.623628][T25773] __do_sys_bpf+0xf77/0x3150 [ 827.628271][T25773] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 827.634208][T25773] ? __read_once_size+0x5a/0xe0 [ 827.639095][T25773] __x64_sys_bpf+0x4c/0x60 [ 827.643527][T25773] do_syscall_64+0xcc/0x3a0 [ 827.648078][T25773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 827.653985][T25773] RIP: 0033:0x45af49 [ 827.657906][T25773] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 827.677516][T25773] RSP: 002b:00007ff59ab28c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 827.685933][T25773] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 827.693909][T25773] RDX: 0000000000000028 RSI: 0000000020000040 RDI: 000000000000000a [ 827.701891][T25773] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 827.709874][T25773] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff59ab296d4 [ 827.717852][T25773] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 00000000ffffffff [ 827.727486][T25773] Kernel Offset: disabled [ 827.731820][T25773] Rebooting in 86400 seconds..