ffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000040)={0x3, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) 22:18:28 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x80, 0x0) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', r4}) sendto$packet(r2, &(0x7f0000000480)="3cb782d450968cd5794afb17b37d2a77615c967a54063e2b876dbc37e4564c02fe0f68b6faa221c0b11a7b542c1e2bc3cc3934441149cb17fc629fbb8a086db71c7b86bf392afab9080066f022d92deb3e388330bf677fd71be2b945aade6b8f40dfa92d9559fe9b4950e04b4426b68177430d9fd50a07f61b8584590cee0317439427afa5d6de0e78da3be700961b30bc43017f244059e59656da96852670a78366feb005c714b7c60be274e05970375a780e9fd6732e971714aa37cc3ac0ce2fb59da1d416b5af5e00"/211, 0xd3, 0x4021, &(0x7f00000001c0)={0x11, 0x9, r5}, 0x14) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f0000000280)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TUNGETFILTER(r6, 0x801054db, &(0x7f0000000580)=""/120) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000000c0)={0xa, 0x2, 0x40, 0x8}, 0xa) 22:18:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007dfe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x1000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) getsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000280)=0x200, &(0x7f00000002c0)=0x4) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000001c0)=r4) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x98110000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xa4, r5, 0x108, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xa4}, 0x1, 0x0, 0x0, 0x11}, 0x1a56a98493e7fbde) getsockopt(r1, 0x4, 0xfffffe00, &(0x7f0000000140)=""/107, &(0x7f00000000c0)=0x6b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000080)={0x24, r3, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}}, 0x0) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x180}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, r3, 0x100, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000}, 0x800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0xffe3, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 585.362281][T20035] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 585.371274][T20035] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 22:18:28 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000b32a5eab5a904e4d000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7a8e26ef6cd6bc1c356cd99c1b667d82a0000e7aa8a39b1d83bcf12529df3694f12946f841eb6a63ec29eabda11d2fb6a1831d12b12075f0c3eb86cf5188d8cfb8784c343b93172a2c8d56ec589d639e5958ecef707a3765f00f267c6"], &(0x7f0000000340)='sfa \xa2<\xa2#\xfey', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) lseek(r1, 0x7, 0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0) getpeername$netrom(r2, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @remote, @remote, @bcast, @bcast, @bcast, @rose, @rose]}, &(0x7f00000001c0)=0x48) 22:18:28 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x6, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x2, 0x30d, 0x0, 0x0, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x6, 0x10, &(0x7f0000000000)={0x0, 0x10, 0x0, 0x6}, 0x10}, 0x70) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000480)="4b6b8f775ba45f92454f9b2c940fe5be05b14b3c926810a9e554196b2319732423fd8d3d213f9c7fb08d7f99ed443dff355bad1f5817fef2aaad65f93d871a1301508091bdbb143a52a45ea46a1e8116f7b097264bffbb9ae381aa6fd1d1e0d522adc42e83130844d66d6fb0ba6d76939eb0423cdca14ef3a16f915e89aa57697ae8f2ff5ea26d02fa24a66f2b0ee6f6083962503264382f576413179a5db64a1cb20f129607680612c7f69845294e26a1ef591b6e5af3b3e9f57169ed310eeeaa1171f6f7410a44ef40c29bafd6097ffce4bb", 0xd3}, {&(0x7f0000000040)="a9a6a79e6f120bda", 0x8}], 0x2, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:28 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x211) 22:18:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r2, 0xffd1b27f1586c743}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0xfc, r2, 0x400, 0x70bd29, 0x25dfdbff, {}, [@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x88d1891cd0b7f78b}, 0x810) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8fffffff9a4f0ff00000000b7060000ffffffff2d6405000000010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000721c267eac000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x25, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x2e, 0x0, 0x1e00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0xfffffffffffffeb2, 0x10, &(0x7f0000000000)={0x80, 0x0, 0x0, 0x7}, 0x10}, 0x70) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f00000000c0)=@urb_type_bulk={0x3, {0xb, 0x1}, 0x8, 0x46, &(0x7f0000000140)="9f017fb9e9a564bd2c555b59a7fe2233c9ec7be8cd2207e5155d3f26c304cad0833e7454ce7ce6b1901b8643239fb9b10b5c8797e454fecdd93e9235db17dd7e326b4000aa0466af037ae0ca5802366db53b70262334204ed0", 0x59, 0xf89, 0x363, 0xfff, 0x9, 0x40, &(0x7f0000000280)="9e4997de009ec4af4f010a653eaa75b865066d20475d32bfc6c3ad2561ae58b6710f25212683c02dc2882978cc87b4850066b7afb21c5cd4aa0e770f40805a33b98e491366fc749e514bf88ab5cc0c8fd786f4ca36f9fd37ce4574f661483ba4b63b7b4e404d2943"}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="b702000003000000bfa30000004000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000058c2b894287be5c83f0437a0d00ef98f74ca0a7c0a643472610cea6d4bef88c33252107001579f34b08f7ac4da8e888b22f6c02e98fd5015c17d942879a60d78cd821dea649f1b0de8807c0dcdac9b1fae5acbc4843aa7bfdb25bb367c785d53c85c6b45d4f0a29a98fc1f8d217462bbfd5e62d7075b6039ad8242afbab20106e2fbeb63ef13105cb7a78d43c75dc2a68545957cdd775a569959413470930d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20000, 0x0) set_thread_area(&(0x7f00000001c0)={0x4, 0x1000, 0x4000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1}) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000400)={0x8, @win={{0x9, 0x0, 0x80, 0x6b}, 0x2, 0xffff, &(0x7f0000000140)={{0xffff, 0x4, 0x81, 0x3}, &(0x7f00000000c0)={{0x81, 0x600000, 0x4, 0x20}}}, 0x1a, &(0x7f0000000180)="b56dc03b39c0b9a706dbe9960f549b48f82359640ea9e9644759edd89643f1cf8d60a4211a0ce688e64ae1b3c91006534fbe69bdd623389466de4f96df6be0", 0x3}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 586.147603][T20035] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 586.171635][T20035] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 22:18:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xc}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000280)={'nat\x00', 0x2, [{}, {}]}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)='GPL\x00\xdb\xca&\r\xaf\xd0UQ\xe8\x01\xfb\xb9\x19]k\x8e\x94\x126\x8b\xfb\xf4\xcdb\a\x001>E\r\xec]\x18A\xd1v}\x14\x00(\xd6\xf4dT\xafR\x811\xa9\xc7\xf1C\xb5\r\xbb\xf3\xec\xad\xd2\xf7\x9d\xb0\xaf\';\xc2\xeb]\x88\r=$\xc4\vc_1`\xaf\xa4\xd9\xf4\xed\x89\x8c\xb9d\xbf\xecm5\xc1\xc8 \x15\x9e', 0x0, 0x0, 0x0, 0x40f00, 0x6, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000040)=0x1000, 0x4) 22:18:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="b7020000030000006c5be1f6000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007a229567eed63c7eb48fa3be2b64eafac33ecab2cc4df9683508d5c845fd9697acbd305bde24f7a48ca261fe030576eea8ffcac7d035729ecd3aa9cc3dc43fb208534f434ad4e2fcd234c6d17376cd1e97d170310bf984521bbc383c79acc3667f3093d6e7d6f1596d7ea25233779b6f18ebffc3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x10000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfffffffffffffecd, 0xfffffffffffffe77, &(0x7f0000000140)="b9010effa4e80c2dc9c84c89a3ebdeccbe7411fff00064e3a6d9ca203371df00c02173d188ca1fffffe100004000633377", 0x0, 0x100, 0x6000000000000000, 0xfffffffffffffe06, 0x0, &(0x7f0000000400)="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", &(0x7f00000000c0)="ef4da660961058adb89d04967063c671f006aceb46430d9e43042573d3835ab8c79fc57fa88dd9940493f1a16363"}, 0xffffffffffffff0c) 22:18:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000040)={0x0, 0xa8d, &(0x7f0000000400)="08c4a52be4921e50b7c89a1b16a5fd97c897b14022728483d86bc2956de2236a2c325bc7b15f72e4455c8f85196308f9f8faf5a7943e270e033cd8fadc9b353a5c3869280fc949094605d54131dd1d006d42dcdefc1e5fdcff723ab3570d302e5e9e0dad9b164fdf26f1b278e9d4534583231aeebfdcd2f6aeea114375b6a817c8b95e7c69997db96a2149738b9e22d83eeba1c256e6caca6ddfeef41b3a3b6dc486a2f75b3688febcc9e76ad0813349be101b488cb2847cef6be1e37385c7437f0d86e1c0cfe82f82044f94f0b53dd8bfbae4d4819553f5", &(0x7f0000000500)="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", 0xd8, 0x1000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000008c0)='/dev/usbmon#\x00', 0x20, 0xc295929962382f6e) write(r3, &(0x7f0000000880), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000700)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'yam0\x00', r4}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000007c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000780), 0x3, {0xa, 0x4e22, 0x5, @rand_addr="f07a228c5c5ec67c79a7691c82f7cbf3", 0x8}}}, 0x38) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r6, &(0x7f00000004c0)="480f8b5b21439bdbfca74c54c432106f04ab9309a0ad799bc08f26e183382b9afabfb5c598e04aa03ac7a25de14f4173ca445a183f5621ae71c1dd3afe0f9eeafb066dcbe8b66af1d7a2d2dc701f9a6b9beb74623af0669406a2d6cf7c00624ba4703198673c4ce8885d5e659d8d9e6171e50f9c74f1bf81d6a0ed7772f3c986e795ce1bac7bde40ae2db2957a516486b8339a9d3e2ff106466790dbd0274fcb42189c9dfc502115354fa63ce224694b0e8ed4", &(0x7f0000000580)="1ac9923c2716c4055742bc780027630e51724ba658c995154417b73fe434ce5492d93cd8ca1fbf277a725265d511f94fe27cd388b0087576d5fcb207028ef1d8584c273d92199e29cc68fc30f8405f1b4233572507076e130a6766e0a4c5fd9753806df29998cb5096d86a2b5f0ce6cedcf8eece7bc00755d67e07463f90cf3ac3e95709f38e2873df292a81f0c9d37e79ccdb8b23592cb1f51575adb2b94702c03bbea73a962d120655d17015271be9721354aa7ddc5bab26a733b289c81896daacccd2b8d380a61bef22da0a0e9062b34f71341b40ee82", 0x5}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xbc, &(0x7f0000000040)="c041ca1cc3f0d6f2c66b31ce7b68", &(0x7f0000000140)=""/188, 0x20, 0x0, 0x1d, 0x73, &(0x7f00000000c0)="4841835c13ea9cdada76594c5be0b1d2a5cfed021cf92a6bfdf17f5753", &(0x7f0000000280)="bbc20bd64703233405e98b0a2f6ff1724c7da630865d09fe4de5b831a7b0f7bb19f9e992041d6f23b5c4085b909d14a93472463bc8f4165f69573005c8328eb023ff935ca5683f884ca395d24fd035c38167af43ec220754769f7cc8969df5cb59acf4963d4c223d2582ef95073573b83991d3"}, 0x40) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000480)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x800, 0x0) 22:18:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x232140) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x1215a0, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000140)={r2, 0x1, 0x2000, 0x1000000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="51fe0be6d92eb905ccc69a846d5e93204a0fba2b548676239fc3b467bf649a07e6a7f6e6bcae95d68ecae985e8", @ANYPTR, @ANYBLOB="76fba15f9bb075b560ce88ed6954c8e1b86cb9b50a6b922dcd69becd5b5feb96a3ca3590b3b25740cd1b041fd5cf751c1e25f77447574321e7324017292f86f21636e896023b3954181514798cf69bc91613cc5d3a8b60a057dbdf1ab09cd8778703791e3f9a96b98a5596150bc527c0f939ade8e1e327a175a987f0db49969c918ac993504a4773a95bc8560d68", @ANYRES16, @ANYRES32, @ANYPTR64, @ANYRES16, @ANYRESDEC], @ANYRESOCT=0x0, @ANYRESDEC=r0]], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='s\xe81\xd8MP5\xb1\xd2\x17', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000000)={0xfffffffd}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r3 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) keyctl$chown(0x4, 0x0, r2, r3) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x3, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000001c0)=0x379) 22:18:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2e2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f00000000c0)={0x4000806, 0xffffff01, 0x1}) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2d, 'cpu'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x2b, 'pids'}, {0x0, 'rdma'}, {0x8d74e810e6e896f4, 'cpu'}, {0x2b, 'memory'}]}, 0x36) r2 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xfa000, 0x140) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000380)=0xc) sendmsg$nl_generic(r2, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8010000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, 0x3d, 0x900, 0x70bd2d, 0x25dfdbfe, {0x1e}, [@nested={0x18, 0x2, [@typed={0xc, 0x17, @str='memory'}, @typed={0x8, 0x2f, @uid=r3}]}]}, 0x2c}}, 0x8000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000140)={0x9, 0xab, "1a47ebc3d3e003a6e754344ecd906ccbe4864764a9d7c1e7cf1b9e8b9e75d6c63ed81fb7ce0237a7e853eaa9b8b06c55fbf4eab0cb6618c6cd0dd6aedf4f95b97db24f4d6ca23cb88e72cf446d3220aa14d20594c7ea08f9d98b8626c14d66f9b42811e0dadcf77c7f952fdaef5fe1861c5c6c9f5d77a16c05ec3275dea2959b768d373c3186f88ff6fe7d6377195f945c80134b9d5fbc5edd606a6a8baa799b358b93b0c751d0361e6aae"}) 22:18:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000400)="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", 0xff}, {&(0x7f0000000500)="960c117af747c46e566d0e2b05bb60f401fb9389e81f6c9fae9ae37676aca86fdd73196c771d2f3c5a84bc62e1d74cdc0db10936ded0f2c074a8309bd50d658a907af95c8a5555acd1896616b799693688c654c8216b4d0779f023c3e3c17c69d0ef286b841233fb50d8f111a4d06a58215addb8e2d1df7ea6355f0ea4bafb605dc59bc4974c904b7be7fecaa4e67b6af7d8211fecfdce9c79e414a6427d08ba5e22fd7a7f3c99665a974bb9637b6b9d996840d8977519d57a7e5207d69ff38c2cfc9baa64dd46a2b81b38c7b5fa7d8cd365810c939b71e42164f1350a43367af929c66705d2a6507ac329", 0xeb}, {&(0x7f00000000c0)="b7f39667827bf4dc6d0403398d3dc6b07c2a6e90b18f784d780f22174a14710e283d", 0x22}, {&(0x7f0000000140)="0eef96991066e123da379592e7e8cb328d8620edb213a5fb2bb21a62e3ea2cb36695bb2f17bf45809fda6c8b54ca4cc291031c41f68b5f4b60b477c06c6164081d6d82106bf0b8917016a2f883c7f59b90bb2ecdadf9c839f6a5cdc1080555030d2305bfb6978ae835d8fd4a7392a0b774ca", 0x72}, {&(0x7f0000000600)="3f02ef53b10bd3a59ca64fac2eb48dd0561d8f35e5e5c55783675a8bed3a8d195b7f9b81c752a6f9c197dd233292be4f508627bee495d9c2af81c7d344c14dd24dd793f17cf4d8196e3f878bb31975d9a1b5e7dfb0e9173ed0741f139a306a519318a3f45dfa49564106f4c6904409097be4565ec45393e632cb24dc0166264c1f26b462572c8562488addcdbf80f9219d38d2ddf4b44aaebea2785e30d2ad97c3f175adabac219c66f39e456d12ed8c799b936872968ca83ee26063111295efd87458ab1b9f236c533d683b6004c74a001f7626cf6362567873dfff6532f066d9ffe3972b7696f97f5a7f84af28ce7b48dd3fb0a24d3d9f7c1ec17a2b5241193b53ecc90d25da57259bd79544bcaccba9709ec560169563209502da0184605f5abc3346cf4f1b4d1dd7307bf73b42070a7e437e4243bc76e8e9026236668d0f274197cb8e4eedfa1c8d3aa9a42440f408ace637ab775436de09031ed74364f1c09f7f8bc62c540f16f2940b1069cce336a8bee57265b5a8793e80730329ab64a1c79ebada2ff02d4e73a4bb511b3ca0ca712e8b014bb9b15fe43542ab0622b13dd5ff87d872401e1340ae0bf9a1b7cefcb4277ff1e2271bc62c5ba3181462674fa3d1d98b2989230fc15d54407e16982865b21e5b97ca92fc04cce088d913e9614b34e835f8a09700ea81ce96ff425747fcda1b2cbe5d7fc5b1e805a49ddae1214409f1ca043028cc308457365b6a015fbbf3c7369879a5a4e82cdbb186b2372bf4d0523c2183f7c828b3705c11ef5118eb2d49e9c8d2e243b868ebaac4e83cd04474e94c044cc2ccecf72667f51c2599107770c9d8c2809bd3010494fc2480f6f8ff98437f1df0dc2eb532d36514bb0e50d565708b83d777707d82469e822762d2298538185f763f5762b206c279fbebc885824fb3f2a0af1646e97d9eee89785d62ab7fda6527f1e770e95b21e0c46724b5b071efb010923354493b63f34ae79fa9847a3b396921baf3ebe8221ede4ca601952c1e0fbcee349d5fbb66cb36bedcc80a4be0fa131dd9d28c6182fbb0223428299c7fa75f3a7949b1a143960549bdaa85c74e5bc47264f655189129547db4ac7b8857ad6f0a2c939669cb4a4275b7660e665904cce20c238de079d0b357a21ba0b59f78fb6aa72818a24c78c950fb8259c07fc1513dc23c1813784031190ff4173689a4c8e18e662379a90f577986da8496a330e71b736946c041c7cef195be60aed8e33d85df08b6b634c56e784297a4b48cd8a1afa7ec74bd88a58da6a6516cc9f58f485f41ba981893d1a13c839313d13dad0f2de9bfeb0dbe93f6355f950e23d3104430f406482cc012a163e6b07bdcc5ffc602273e64b208472af2a5841bea2fe3b2a8a12ef6159386bfa5eb60dcc51d4c5e2f93f0ef7af70796a8ed68ca56059259f8521b7d928433388522bc009bdc9dbba0e9844253581292ba703d9b68ef6921f0ce070e6a7bf979f74e8d37a5117abd316881d414806373a828d6c1a531eb01d1aeedac66f36332fe8c8a5098563778e6ec76be17e4a3c0c52a17af171eff870226c7e1b5ee5a61752301bf1b67b171f866e59d7ee3aa6e136c4d101c0f48d4cf484e1bcc7378f2c2c2e8fb8132cfab66395064c8a585dd59a58c806c866e1c5917929739a6c475d11b8f9d7015b75b345768228e35b86ab1b3f35deb93bd49e32fed54e7323f89ef35f7d98e40c3ed72e527daae407b21f2384c2006609d763780a984023530a9fc1b2abd3449a522090a5434b98e8e72872a6daf90b7bdfb74757c6e8e698180f40b98e7a4bb2c8341683b779f73489a5d3ad22df04bed30eef432c0a646a2f93263f5b7d6a1588adbe4b9ef3188594620f9e4ba56b4ce68f1cec83d3be0b62250703222a2a04409daa33b4f2e61a4856627b526d040b671f12f9e1702aeeaec7d70b0dffd72e272ecf97ce073df42d715229f8916c9d6bc9d8cfc4f69c8262026797bb46a21dc2ae1f3d62e949c26d094dd629e9af92d3a538e51f2b0406fd6d9dcfe4c002ed8acde962fa61079d7de85c532c62715dd98ea9b7ae1cb9d8d32f18b3789001b7ad9bc4c75ae95ae00301fad96a6b1717e49cd7a9cdd0e74aff36389dc00acdf014c1d24f5660da7c2d7504d88f3b2c3920464c3a36dc88a2fcaf51b3e3eed3ec6ebe43461892d2160b6df8a19bbbbb5ff5d7847b16837b114ab810eb5aff3ef12ef582d58e5c9ed70959eb77fdfe6ba53002c09dacf82b848ff3180d5a9d7a213fdfbe2be423442765e10b83a882735f93c5bf621ced3629a29a7222850036dfb575a7672f1701441a45dbb0b18ce6794d340f308e65b6c593a26a35a449b908608251f6010cfcc3bcf49fc3b20e55622aed9ce9f3c22f8cf255c1e2dfbf5d2721326ca4d69d754003400f08b166bffb6dbd3a677e5956adb4d0187844e2dd986d6ffcf38f8c4760ca09e3e9b549948f04a220a6741220ea1c3f207a917d8811de4821dde648394510999ef0a49871bfb5b63afbb2e0cd11d93f3e0ebf9096a1fc65ccce531a281f5e17ee9782ad2ab87a91ad28948bb6cab4fecd763a7fc7ea372439f215fa9b2d206e4cd2ebc0f90654a6f01b25b1bfa976db1c974b3298bdc5d0b803e935e102acf2a9f306661959e887377514cacb5c36a69a89fdf4454b93ba5976dc0411bfdf8647a50189cf09ee94c8d371838120d73085272e2ba26f26fb7fae2396fb4b279330b5eb0f969f978d6ed5c9bf186ef8c3f7b1eddc02a5ffd51141ecd9dc67d364d1245fd3bab436443c5e14f18c2417ea4b1cf89894d71a2d44f86ebc4d742f170a1109a1704962462fb1fa1c1eb97321a19f206767673d13df839fcde49df35a055a5431106bc7173d4108fa4f26b2be5973c0a775fc8daf29356cba8e4afa35826a6120ee7030962d6adb1cf30b3e66cb57379464d8443f68f811ff7bc9dcafd827d15197ac870eddf7d30d358a63690c1cedb9b10dd826e6468bf03ddd1e7bb39bd2777bb904021aeed061e8edb1feb68de1da4288183bdd4017e6d0c6ca3f483635a9444b1328356ffa57256c77f061a2a4407aee0f617a5730106a9a8ac2a8731599c0e271e7992c965f1b7b3e4f909b536530d67f55a943091de67e4ff447a044613ba66baf473e3f13037f025597562486b36039edbb5b6526459669f39b0ca9ef11d21b195dd35e1571e126995cae5ac2b9e0cbb43c30cee6efdbae02f553ad85c99254ca0dc345cf5ad6e3c54ce509a168419e23bc03de8e4a5266c1c71ada70a2d3a9b806978eb368331b12add74d4eb94bd02d99acf7228dcd05225080a0dc13697a74e5ed1a32d987f90d2a69a5596365e4b8ecb4400c525613f259b0a55f7966c41322a9375912171c4c7a632c6919682ec0c07df9088136f59096493b0c92bd29b55461dbdeb185c597a572b60d938b6f4d2a5b6a857445dac4d35d639d46df94ff8c9008efb9d1659759f3b5be5796b329fb82527761c87de832a6f16ccf195da6dabe1dc47a2d14ea8e459489accf60c526234240d2d2f54a0a98dff390a204f2c13cdef6572cd6ef1ac9384c5e38dd8ab7817a5960a974674f37bdf162516e3a9a05ffd745e89fa5c4e33fb02bb967761beaad22273e4bb4e99cc8c4659e95da71d1056aa2623cb1decfa37f57cd00feb07553dc37974a1533b788cd881b820fdf83c915dbf0eeb6b180e80833508d59f875bafec0ccd20e578eaac5b52a7d11f9e5be9f2305147d661a682b5c0705ed489f63b5a41c4caea6eb940ad959fe4c3b9b8afc03bfadc0f7cddd9fd4d6ec92bd765147a88e359dcf76c44daa2a8a3d44fd68901fd7aed6d1b11724ab2f067b46189036ccd85d19332c6b21776b98ce08dbf44b5523c72466148143f4d7552af6f2a4ee9b445c6d20c3eee8d4cfe79635107a67bd4ac356fcaed95ad190038f49f15d4980d1ef7f623053092ec02076a75de095c4aee9150292aceec7d1a7178d9313e64595ece74609546b669758bea44b0db0913983d31b1e238c34af8c5125e6f74af10c55c7ce78aec54162d66ec21e9ac5bd5e20a6c38e7a32ae53dfce40ae6ab8e18a03e40a6f06a19a981a8b2d4e4505d5b4922ef361300317535e2925d87408e199c6db88409b0b0ef5cf1c84c742dbf8bf2eea75f42a5d56a97797f922be18b918d1fe41a899e1095f5bc27fc7b93acfa18b5ff774d037a39ed366f184f9baf633ca08977710808b7f3239247d61a24dd924d78c5f858489963c693c01d475825ac45d6da12113f12e8cb99cd2c1567450dbf1efd6c18264440d01e19fa5fead880f96b4504c202a668f902f42e1171ae679497317eeaa9fe1ea1bf909d5425e32872bbbf40f6c08158881c59b679e036a806b2cea92f13ac76c7ed1e69bd08396839e6beb01b42e49924d8e04dd4e67c7fb6080f6c4fcfe2eed9de04c67fb7f31c56fde718fdc840c9e69c43075b091812fc8d73a1f325b020e3665da606c3411797bcbcc2595a1ad3ddffa2b33166b2e4ba5ab3bbfe2c80ff47f91d8a38a6342d462a20eb1b278e8b9571bc2389a19a7cf937f39b0dd3186a944483ac67a07a1afd2dea24a956210a0cd5cb0141cc00aa13022ffa26c97915c7ac8983305be9a87dbb3206a6eee87e26804c6fde835201bbc2b3b30f5faddb14a2ffe1a69d4a9eeab78b4246bacfe71520f4a3fb5c65c6ee157cb74f74f30e1d5a8bf89adef780fac75de39660638aff2e7ed452a761566fd304d4804435d407f747a89f2d25fd7a12f1bd367c1126d919f4c4e492b56fd704d4545e34431c8dc4eeb4e6e1057475da0e40fe3cd1e9594fbd0d22caa5846c8028b6047be3b141c0ce816cb568e6875d22b9585c9b3b0a281738b01a5c7f49499ef485a352e0e53c6f1763422b0f60a2e59f10145ae6ec68e2c9e50e883e9a7e12c31600658b6f9f5867b2a141d8bca0285eb5b655c01c6928d30ac3e99c0a3440ea551f8b049d6a5c0b905b696e62970bdfaa16256bdd1421b642bc4ed84fdcfed8dc118561fdb9ab2dfa6f1172e5d54b52c3a4546a03101d928ea0b6ff9e61058fbc7fa706572d6f90535f99064f668685c0066816a16531a61d777145f9c0c0b62c2fc3291ebf4cc62c7853a72c49e51513922c006ed5245c0fe43ae51b787f09e47bbde244f31354afbd13afda1d089757059d3c1e82f2ff269448990ba658f9e9fd5a73a9e9ec123206f218402cc01f7786d36cce9b774762a25d6e98560652cd04d263292892d440e982956607faba37693d77b9c68943fde0c2e218700e356ef20334c5f02e6281d82adf3c8197108c56c94c28b2a7b471cbb33e6630421b8465d639277a0f2f974cdb8159c6f69a4470f269043f1d8e72433f23c91653090c2a156d65fa9f595c76ea94026fc819ff6a9c1bd3badc35cf94ec0ba9d9715926dc0fe9ae86bd853309bbb42d8885aee5de8ab4db232fb15c5409ac087e60ac4e3a1b30c22ae86202071fee002cc666a415aeeaa96b2f2a497e790e69e0fdf574c16d40a36db6cafa5983249da7bac6c4b363d20239960fb0158301c456d4580c4a14bb97aa7b8ddd1e1543606989ee594c8759a228bd3fb9945c62ec44004163ac5bdb631543167488a0d88189133dcede2aac7d1ded7666f658599a3a5b58ef7a85cb3ca77a6f25025437bc26b00d7140dc5c8382fd512c265d966064389b8b70080b0cf6341369d9b13b9b88ea9a7820a1e1613eb2c049f3cb24caf7bb7b3e9750d8a5735681d19d52a0c5aeb5641e671102d547c48468e5b58413", 0x1000}], 0x5, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4e3590dafb000677b0000ffffffff2d640500000000006504040001000000040400007d60b7030000000000006a0a00fe00000000b70000000000000095000000000000000000000000000000a027221ba3d497b250a15164ef9b97a752244d7990143ef0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000040)={0x1f, {0x1, 0x23, 0x9, 0x8, 0x5, 0x4}, 0x81}, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000040)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fab", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:18:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff790200000000000000060000ffffffff2d6405100000000065040400010000000404000001007d60b7030000000000006a0a00fe000000200000000000000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702713a03000000bfa30000000000000703000000feffff7a0af0fff8fffffd79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000af40839765aafe54fb450404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000028a207a3805dc08c8301d2a2841d42178cb6497bd0e26655"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x74d2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:30 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/78, 0x4e}], 0x1, 0x200) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) 22:18:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r2 = socket(0x10, 0x8000000803, 0x0) write(r2, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r3 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r4, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={r4, 0x9b, "2621c90ac40947d39b42c5c91af91a877381f1420fdfda4ec949e4ee22cb602a7822e9f4f1102b8b56feb348102e71e97d4b016286fac86077a3631fbbd6e4e310313bdfc7ca165d2f2e6f30d75d97695b30f8d8603e1f09859603a578c9a202c5f0e2622b6108c3b4f8d8cfffc917ad7a685660e1505004e056fa3eabcf6e747c65d4017dee811f6fb3d726e5704bc88a5506f4d270550e70d439"}, &(0x7f0000000280)=0xa3) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={r5, @in={{0x2, 0x4e20, @local}}}, &(0x7f00000002c0)=0x84) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$TIPC_IMPORTANCE(r6, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:18:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0xe, &(0x7f00000001c0)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007e2ff0000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff1c00182613d72a64050000000000e5040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000000000000000009500000000000000d08597e336db13d56a3cb3aa00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe10000d689db9b50f2ac144000633377fb", 0x0, 0x100, 0x6000000000000000, 0xb3, 0x0, &(0x7f0000000240)="a448c9243b6d5cd962a6be7f23434191721832442f6a196085eee0d87a7eda62a768ccbe4d04442aac876101b47969de6b7b824b04932ee659fa15db63653336313f981dddf1651abaeb9989d0ddbeef708c8b8e764231d07ec23ebc1bbdc3fde765cd30f1bae0457dbeea53c458afbfb2331cc788b56d51cb5a04afb81c1463e992110d226ed7c44e20bdc40cb371b4d3e85974f82b4929551beb55153065b0ac1ee1939d6b1691a83a8600ace7c2aafa71a9"}, 0x40) r1 = eventfd(0x61) io_setup(0x1, &(0x7f00000001c0)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) r4 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x6, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) accept4$packet(r5, &(0x7f00000017c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001800)=0x14, 0x5329ec5ebdb7f2c1) ioctl$sock_inet6_SIOCDELRT(r4, 0x890c, &(0x7f0000001840)={@local, @rand_addr="7d2fcd3abbea434d755eeaae016ae7c1", @local, 0x1000, 0x4fd, 0x7, 0x200, 0x1, 0x900000, r6}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0xff66}]) io_getevents(r2, 0x4, 0x1, &(0x7f00000000c0)=[{}], 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) write(r1, &(0x7f0000000040)="01ea02597af76ea34acd5648c626902571cc2daf1e402e7837e76aec21d9debab1135a16", 0x24) 22:18:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000000000000ad, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe55}, 0x48) r1 = socket$inet(0x2, 0x2, 0x7f) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e20, @remote}}, 0x0, 0xff, 0x0, "bfa7f700a736f7a9e9efcace6b6f50f3ef38353e4b33db362c5bbf29920964475a1bbb9c564c07d8e20e549879c826cc0ae3591a8915e7c8c2206122db4369f7abb6c53b3f7dcda2c208218362cb16eb"}, 0xd8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x7, 0x400, 0x9}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r5, 0x6abd}, 0x8) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write(r2, &(0x7f0000000340), 0x41395527) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000040)) syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) 22:18:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe2(&(0x7f0000000040), 0xa0cd47b7e6be5ca) 22:18:31 executing program 2: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$update(0x2, r0, &(0x7f0000000140)="f4789c883d78676be44301fb999f51c64ea11ed5ab7bebf8a8363d146bfe8ab7cbf4e116de51bd4f2f08c538f001e2f3d4c1f51b1dd66c4a511ccfa1400219f1c76ba05bc72fcb228002867fe39f923886cff5f5342a0333d6d6f13514ce5b29bbc259b5c2d5be7567599d8c773a9024d67dbe88150d6b8db90532197c7625c82ffaf5fbe49e2ed4e668ca6dbbaf596b46ecf6ba143b376c61813ed9a81492f362a95cc9008a3ffd369f10", 0xab) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000047a5560c1a08b878004000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$inet_smc(0x2b, 0x1, 0x0) 22:18:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010effffd10000009e40f088ca1fffffe100004000633377fbac141466e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x67}, 0x40) 22:18:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7860000ffffffff2d640500000000b4bbb86500010000000404001801007d60b7030000000000006a0a00fe0000000076506569ac850000000d000000f7005d00000000009500000000ecff00a4388c8e2778251823ece2ff2a512ed52f18af50e2598b4e36b97fa41809b243b117783a4dc9013232471a2ec60c91b601236fb918b089"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) utimensat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)={{r2, r3/1000+30000}}, 0x200) 22:18:31 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000140)={{0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x7fff}, {0xa, 0x4e23, 0xffffffff, @remote, 0x1f}, 0x1, [0x3, 0x800, 0x7f, 0x0, 0x8, 0x0, 0x4, 0x8]}, 0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f00000000c0)={0x10000, 0x0, &(0x7f0000ffd000/0x1000)=nil}) socket$inet6(0xa, 0x4, 0x7f) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x3f) 22:18:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) bind(r0, &(0x7f0000000140)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(nhpoly1305-avx2,pcbc-aes-aesni)\x00'}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:31 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x1) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x1843202, 0x4) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000100)={0x20, 0x0, 0x81, 0x5, 0x49}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2a, 0xffffffffffffffea, &(0x7f0000000140)="b901050000000000009e40f088ca1fffffe10000400063338a0ead7cd291fc54fb7f4914140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x9, &(0x7f0000000000), &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x9) 22:18:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) prctl$PR_GET_SECCOMP(0x15) r1 = socket$inet(0x2, 0xa, 0x3) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffed2) r2 = socket$inet(0x2, 0x3, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000140)) sendto$inet(r2, 0x0, 0x72, 0x20095, &(0x7f0000e68000)={0x2, 0x4e20, @local}, 0x312) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x15, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRESOCT=r2, @ANYBLOB="17c9da52271565c0df172ac26c35a5003ee92627aa7545e40c0b34efca9398ba7665590bdee0744f6391010790da66383139a2ef9b3063cc7d9b69e15a7e77912830588ba7113062b0f695741387dacfadddd401864561c4593d6d1fe8c68e99998c2be73c635b2b926f6cdf1714e1be39d9bb86383ed6607f70c5ca28800dcf31f7e4c8550000000000000000000000429bb51757"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f098ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x1b, &(0x7f0000000000), &(0x7f0000000040)="0010ae37df2ec96beab9df80d3651e000000000000ff76c3b8fcd5"}, 0x40) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0xb0203, 0x0) ioctl$VT_OPENQRY(r4, 0x5600, &(0x7f0000000380)) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000003c0)={'bridge_slave_0\x00', 0x200}) [ 588.614167][T20184] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 22:18:31 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b7e78ca9ded4a408bc4c72fb4937f92402000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000d7dd"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x70) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101080, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) accept4$llc(r0, 0x0, &(0x7f0000000180), 0xb5c6ea798c2c4141) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b70600007fffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x115500, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000000c0)={0x0, 0x0, 0x2, 0x9, 0x3, 0x7}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) gettid() 22:18:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 4: ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)={0x0, 0x100, 0xfff, 0x3, 0x3, 0x7fff, 0xa52}) pipe(&(0x7f0000000500)={0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000540)={{0xa, 0x4e21, 0x0, @rand_addr="b90fdd9a780e74b1decc5d3c2757d319", 0x968b}, {0xa, 0x4e21, 0x8000, @local}, 0x0, [0x800, 0x9, 0xffff, 0x1, 0x0, 0x7, 0x8, 0x3f]}, 0x5c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x94, 0x49, &(0x7f0000000280)="197e1835b7f35051539f5c5c4d8d330ee4f4583659b235200e86c181e8ad0200ec704e2caf0dae386af3fd3c4175b800000d6f1963e2cf0e08a03ae67d69859247e7dc6749352786d8dd7fbf5ec343430f7cc343939b5ed260e2a410fb35985cfd685a18581b855b72f537613d5c934f6b9902bf3fee78f5ecf741324a3bf132c6766461cd1ae9487e5840f6c76fcdae42baae7e", &(0x7f0000000140)="1185bfd52d70e2bd733025147de72a50577c286b88df01b389e3495436dae944704dd337cd95213515c640844eb5f90a9b80467aa589017e6692fe25159f1c00"/73}, 0x40) 22:18:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000106a0a00fb00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8000, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f00000000c0)=0x1, 0xfffffffffffffe4f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x40000, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000180), &(0x7f00000001c0)=0x4) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) 22:18:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff00010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x7, @empty, 0xfff}, 0x1c) 22:18:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xd, 0x1, &(0x7f0000000380)=ANY=[@ANYRES64], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) ustat(0x100000000, &(0x7f0000000040)) 22:18:32 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1ff, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x2}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2000000000000120, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x41880, 0x0) sendmmsg$alg(r1, &(0x7f0000003340)=[{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)="5b588d5329300915426df7255abd9b66f1ebcb39a28536811792eeb4d13490cd20c365793227f48325f102435fff00d5dbb2d52e93ce27134f2f61b07d7ee2645cf28bcccb89c8a3d5d7f0397a644d880b998f0264f3061d4e083230e2b42368", 0x60}, {&(0x7f00000001c0)="e041417d14", 0x5}, {&(0x7f0000000300)="a9afa53e0ddfd98c13295a97fbb4f5064206f18cb9253e7a749f5c69f44d55fb16a0c92e6c4e3ee17d8b560cd0482ad699e98cbedbcebed6a6028f80ad2cac2abadaaa5f4acb45c118617563e6e58a4e1bb879202aeeb383af75531fa82d05b5aa131521197a215c03b664cdfd923e79b1e55d5d0346ebba307cda30365c4fc67b27586f3bf813a07805ada3cb922d883074459ceba9ea63d2da1e9b35", 0x9d}, {&(0x7f00000003c0)="53dadc62b93496aa17721cba0db8abd98f", 0x11}, {&(0x7f0000000400)="89e37022e80fc605c5aa13fa033cd554d7195570593384b55a54680cf608f6b3a7e3c03717e8cf33f0f63eb42f6be483b95ce476789002ea18ca429155dd4962e9fa4cd2dfc3c020143ff554ba472431f422883a72adaca1f17d86fc5788f36afb638e329aceb3b4b3b1d35a007dffc24f8e7c38ef0efdb44b2e8349bb4d5e7538f74fa07a61302dbf697395fa1de5bc2f97aab64e6cf4988616f008993e57cd3829f165c955b2f050f1fbcb1835f75b9f185e4458e1d010ba", 0xb9}, {&(0x7f00000004c0)="1503de1ecc153fc7caf17af9fc677d9a7f5134cf9c2d6ba984bc04c298074a44498402747d44acdadece58fc8804bb6815a1e8b37964ca1b56a850498539e0b0a6342ebef29c862ee9998b4f79e91ba64ca30b3e53edbfd07316cc67651ace69e51fe8a836bfe7ff49e945bf7fd87a7cb02d0f920807217a7aa7ebc61a79238d0da24444df12ea", 0x87}], 0x6, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000600)="1279af54d4c5857464fa4138a72eaa25efd7f252b787016d9aa12fc6e280c95b5689c846ae38bdc669f5c603e21384d77f5f641e411a490379d6a08a231fbcc31f9ae780d28751046e684e7cc89ba378af404d4bad9c8bf78fe90853e5b49ab73f7d65ac11b5058f23edaea545f83ed109c2b080de93d2e3b54ac45d10e7e527de324b6d0af7bd5320fd4a42263e17830b0f109d5a0312ac133db1ee4532051ff3e34c3fc205c53b54313fe21352d6218fc112a12de77a90aac8f9778bef8bc3bc55473914f989e44e6688e2b762cc8baa010e853ea7ef4d4d4602c3b5e04a903d8e24a14a5f5f04f68d1152", 0xec}, {&(0x7f0000000700)="f1f5c9fa3cf36af3559843218c8d8b7767ea05fe7975bd01aabb63a6d0d85e51f471cc0393c4f6ad953a6abfec4ba231e6fb43af0ba727e135f14ffb842fef77d2510a30ac06e54fa5959ce6bc429742efbb0219c002b793da0663ee6accb4759a0c8184e1cda46615c48e7d8e721d56ea9ce03470d3e70f38a431db86d9e10b23aaa978c83b4450d342d7a060789ff8bbd0cb113ffd1783e0e16a95f3e159a33286546b42bcab711e844e", 0xab}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="792c70deb3b223355d0f5b0922c34d8bc1823ae6fcc2f300", 0x18}, {&(0x7f0000001800)="a3871fe0a8390de73a1bb8561fbea6055afe0f501873245b3035b345714604a553300a507d8d24ff800d46665f2625b571c1ed7871b80b5076248f2c49e430cfaff34d2689f4a173dd9471a313d5d0a9a30cd99bb4f4ff4b529300dd", 0x5c}, {&(0x7f0000001880)="96a4e34d94e70a7b191830b32c2afb6dc589a6c8064cf613e90c6a9f7b6b9bf9677aa17a722297036b7fcee7f902a54e0760227f203e92fedda86e4847ff317bd899d265", 0x44}], 0x6, &(0x7f0000001980)=[@assoc={0x18, 0x117, 0x4, 0x3}, @iv={0xd8, 0x117, 0x2, 0xbf, "7a385b739058c482990969e488fb3d01d27ecf56dcbfa622dddc43f7eb4631e1daba352defe87c9b0314a9af3da170c8dc9ca9785f5e49fbf9107a13fc2fa2711f296fd1b243af0b811296b56100be5891bf9c52714aaafe0b61ffdae8f70cc08c691bc9ce8ae0eab4edb2a418e5f963d8c604fb1aca949cdc083cf02f697d44084dfd6d98c0b187d498ac39572f74f20897e53b82505997684473ced0541497974f96b92b1ba56c5165292a1c77109505aee451e090a81cafcae9473b8b2f"}, @iv={0x48, 0x117, 0x2, 0x33, "25b5232b078a062a254b533521cf33f9b8805a8e7d07111c75b9d5f7919af7ab66a8465e15f93917c244366cd37db071151d51"}, @op={0x18, 0x117, 0x3, 0x2}, @assoc={0x18, 0x117, 0x4, 0x4e72}, @assoc={0x18, 0x117, 0x4, 0x2}, @op={0x18, 0x117, 0x3, 0x3}, @iv={0xd8, 0x117, 0x2, 0xc0, "b1a698256d9e6ce16ba3687dc94761008bfa634206a9e1282c299fe976ab925e0e5024c6fb8fd3b2870d69d6af2c1dab9e962c6200d507f2cb8679167f2fb56cf508f56c6fb72eb606c8fad1020c6159ee034b05ad65c34702cf2152ce91b3e4318ecba303c2e76bc2318ef1e8d437d62772d3b139ddf8b34b5e5d8c8c844e11b9a8890e11dbd24f4035c2d1d553f43ad6b69ad455b3538c81e1803c36b79b5fadf4a2f804cd77e0ff9d8dadd2330b1a643006a1b82b8987376cb1b35b4784a4"}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x288, 0x10000810}, {0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001c40)="b9058123ef3bc605ebe3c104186e75e3d65087517a76b65191c0259ff423a57cfd86bc7a117a2a647a964f802a29612c18bbbc710aebaf539c6a23174ec2230a1aa2d50586899674719e1af2842b3074bfaed821f0adae63bb87962a65781e2feef1e49ade70d65381b61751ae85c2d1c89b8e4c9371aef10e2bb2ddc79786deecc8a0b07a6cf74070911aab2e5c5d90ed149ffdd3627fbf60316208fea7a7d9b582bdbbef8e68ad5e1be41d43ea642bf2330c1d3dd129282dcf9161bc0f03a4417abe0aa0063099c77a9f0f7da05bc8be3694e0d5b4d12e060af1db810888fdf0b7288cc435c08e9b26a564de69", 0xee}, {&(0x7f0000001d40)="5264afcccb561159f9b672110061cacf743da41c9541c8abf8de47520ba55d7f612131edd98301911a4988383d23980ededa8d7ba0c10a86b38f5899ada3000a7a8dce978634005c0c31462b90d2a78a2db4f688cc2fe5bf70e7d38963df74973f46be388c97f8c43120e485196d9af0961036a88d12458cecb730291a6f58f45518535aa37001070779c711602b5bf73639fa2dff15166fd77314dd5291ea21f37281d9a7969729e73dad0a3dac8257e9a472af5a70e896105e80b39d3dd43bb657c4adba14e1c3dd4b9a8939f2599761ea3ad3439923fa30dbf3baab134fa9eee08152a3d551eb950c52f4af2f266bc2f97c4c98e5", 0xf6}, {&(0x7f0000001e40)="df29b2a87b5cae2a94203f0f931d1b28abf3769811694b082e36fe0d0118e22e4caaade7b7fb9e252791309d77c204e2af7aa7ff004755832e9812ed7610ae634e55a39c6d2939c60a6415b30d73bde1fa13fd53549ccd5003e656d88b191e38ce9beeca45a178dce4200d3300172f01130e2706519879196336f9fe9182dc85353852fafc44eb77e88bac5edea305b28cac54cf966cdeb1d029ce8508eb985687a3f0738c4416b4a744e5dd52b18093efc1d6005cac8cf6f8f90b701c073544dac1d83ab16c30300b94205ebd2b702c3ac3f8d2cc2bc520513535830d9698db2ff9204c0abbf526ae7eac8135a84f", 0xef}, {&(0x7f0000001f40)="8a4189ff184a9f5aed4ae346e206413baf513f1c3a0bbfccdecb58459183f7ded05a8230de6be584afa8bdf2380045eededac3039d58256b0827362ee7749009b9b08bf8755d2fc89761373e3ca4f12d1a03c7bf7eea64044ce31c7c1a9f3ecf5e2c995ee06253ce99d542a99a6346d87cdd914bef3100d0b2adeae513d4abdf9b4f951416b58000b64ffcab0f0e48651acc64d1fa9a4b510f7cff229d260e6e7675", 0xa2}, {&(0x7f0000002000)="c605642c6e686556950a2559f7d0a1e76c7f67b0028564f7c99db334c21b1772caaa301015c2112268667825b675f4ecd3b43085a269e03856285fdb46d5a2034066b32132a34a18275d64dd672ac181de74abd8a585159e11a341594ca701f22f21db7dc197a480c2c1ebf41c2baaf38acb780284e10d2e20b34b785cd39606df7e6e274eb4ee56ef03ab7b0e2ebde73530923ec48980cf839acf27d1345b658893f9afa14b305fc3684bb4cd0035e656de826b6db222d449f6e5dc492933817867b19d31433d6cfac9f078d9884889758393de2df35ed14557bc708e47dd541d68feddb3c5cd14607f58c6524a343a3e46b19e2d11008dbf88f0651a14ba5529325d3e868dad86ec7cb20be49fcdd12d2a1a1839e2264650a90779ae949ef2ea52d63f3c1ca49cc6648b7e796493f356ebb864102cf21235778e7f774fee0e4f0aae2e162545666e8f7b5ad88bc01aeccb131200d6a9fca4d3b13474d4097352084231e1911d6c26b593b4e690beb6997307b9d07318376f8498ec51c9b7a1eb84d7e81e8b175108e28c8629c904c611739fcde479251b90b3fc7d483af4de386b66164c5b215cff7dbb1b328c298213063f7ae44a9bdd6c65f28c3ecc197f85b1cccc4eb395281584a6371c66643e4044457cf577d4c063d8994afa0a67b46ff9323b9b1f2b5e173335963492e4357989702613e2ad41a5693809524bc0916a06de12d56c4ea47feda2f32cd993a4b92d7f405a03a84dc5bcdadfa443802f24fcc4f05be37c898d2926e50af983cff2ba04832a212f7947a500db148e7a487457a20760bc3c005b9b915ae348498859a01a2b2e39c26c74dd05f1ede3ae861f50f7827b652c3f07ca2da90415bb75f3b9b845b74589e609d9ea56cffd028960ca841c7ce295819ee8a94e6146b58b561c097951fec46d7a68bdd25bcccc452dc595d1702f914c78f59063a80abbd252e4430c9b61f933ff40d707c3347e58a3ef84001289ca5d9f585a0eb8e9c0a44bfeb350ad5ce2b5db60fc020bb36d43bdaf6b9430e3cdc4c40e54a779b8f19ce40238f7c51cefaff8e75b06ca90f86dc872381271444170aaf01e050987321670ec724bc5f740979b65caec1d5f5a0b0c6acab184976fa217b534b368edcdf6b3b8daf1e3b9b5c1e0499ab42ce74da138f197b849f7368ff8a06c532548c9b88f26f5d0196049fc884b01ab6f9e9d72bbb6dfa0b8dcbfaee827e8ea90bbb4dcb13a693164a1ac7de80e43db3ea208a6c8c9f9f4615ce24f4b955864bb62f15975192e94496ef4cbf82c67219d4f540495044a1f9f976432fcf5c2955e1ce6b81141d795a81a2b36202a290538b27d0dda9516259db8cd1fe993f4be9882ea18ccaaa955732bc03ae13744abd76f8aab2822e6d1dbc4adea9767e626cb0f7a7eb75c7c500e55fe5e77c08c9ce16e972a074a198452e779ee2db4038e93f4120c7408ed1d5c0d21aed69c7d5dd22207b7c73cb8c1ff5a20561b419ce653819e9a4f51e7bf295858d37ab0002fbdcfa13defe5f376100f17ccf516e0ce47111dc72aa817ab9af739dbf931a9bf9ee6da33bf6d39ca3d6705c9e92b3f2d85034357a03bf73aa3612a846bc2078d2d11ebd9d9752ac414e12a39a70ef34ed5c172fa60cc4d241691d62af54b706cf235ab66b017208e50866e50678a874b69e7d8ada5af3079596103d90f02e6af780ca3050908c452fbd45932004ed42d1bf32870c793dace6a269fd7f9d3eac4bb9b0b4be350c7253709ac5f228b85a5f18dfbe0c7319c37d0a0322852553a42f29854a8434c2eec7fa0a27753082435a79d40e90f4b56b4e54b1a792e04bbc6c2124cb6fbf80800a6276ac00630ab354692c652b57a8c661de110fcb71844a89ac0c55c49bbe618a3f71d1de1ce587ae7af6c863f27dcb893ffbf10b3511caa5e3f7ee53a63ba89efdc67e3cc1837b346d0fc4a1f31b8fec27dffa12eb3175c8ddf0e4fc26aed7bd21303413a9f766f7afb079e91b3660e7dc9a30b8341c320362362aaebf884961b4c21cfca619e96b5bbee3b8da5e83aee9a82f69c6836f7e9075994648450e8551910ec01f8ec776a2ce95440723a29f3a7524141442912d02399f03ac1883b2a4d75eb6c5237a527adf4806411e410932cd4a58b89ac23f5469291e412513bcf35d32e1d15ea985ed85165e91be2d607aad6c3a17c0d5ce724ab1b7e2570f46db36b030c23c25349ad2b1960a44e7c2b67614cf84adc83a5d03eee749c4c682bcacca8649e3e10b7143f7db8c50bf46ea25594dd6e6b3ae87fda74d058ac2f9f0cedecc4b7dfb09e714bf3ed27801796118a3e8049760ad54d88c386d8f2b858e2d41be2cb9a6bde2c7a5ea1a92a16d42ae67ef23bcf333f1b38f783842a761e9596982163100a3253ea8d5303a41f8e54271a0174203d7c8fefaea8c67025a2f4646c22db96bbfa2c5efacf5bbff44a7f9e7caf08851a885506c2c96b374f0a1ee1fa503593ffd3421dfabd87e59ecc01776a37ddbe2adad313a498859f3596017c3c3013d5160bcef33741148baa9dd30ee23104c462a501de5a6eae6dddab60ddd71175aa28500f9472af59f3db1a0d8a64d7f6e87eef54f80e6927ca8586d8c683d87ef0ce10a1b1062011d41c085df21efd9ee030a80cbc82c9e6b28b941119a99d02a312d82968e9bf270d927aba851cf1807ea1c2eb2747ebf627273e01d2906e2b7fbc9d9ca03e3e133f0f9969df8b332773342ba488c41987c2ce0df147c84d4bb6b7e3aba1781f603dbd75dda54ae93d0d6f49b13924f10d8c94fbf638f3333927670d79da0edf61c432a3a195921f3938239b087b2165bcd791074dc0d91b2677ff1590f497763079b519ad29643b1355c92236ed09f3421e00ebedd042ccd57474e6c90ea04a80bf8ed019f818a4660abe1d656258bc91fde1c4aebf10db1d7b2f8f8e561ecda9d76085fea21e1c3b877b4cea00ce3437941e2890f8f7b70e9c0f2be3d55c1f4e385db15a7e520d84a1e614a2329519714da351db8c1034e8373f08f972a69dacbdba366bd4bb26aa5f8b378345e70f301c7a45e6be9240b4d4c74eee0488eb3a73538e9f4dcadb4baf248ddc8b15da8a7c6ada6511432971372b486b21408a257b307063862536b9859f36bd1f72d0cb90ddc963c96a01c8eeace094a4264c712522a58634b83da943fcb5953d61e7d2191d1577bc785dbaa5174f16661ccb90d3abbbedccb215eb5ab61b4e87771ca0a6974ab0464ac74b1e881c0cc4400c9762ac551208d1b6ed12f104d577b667baa5628234851af43a2204eb7c5f32b47b854761622a6f18603804859651208904f9e27f67f8f253af3a5bbd6ae5bd5619d5611fa0fb2fd4753977e23f886de2bf84cf5f2e97ae65e39badb407da73aaa51bea7660bebd14f84bdc41e654e1550b8a681a1342e531d1d3af9bcbf6f440030b3687d04b95892832c31b47fd6eb0b6bff92b55232549cc19c0c53ee2ab26aea785c7cd840fe20aa1e03705eeeb273db110418a0c2328dacc5ec89fa6df9ade5d0b974f80bbea7f6ab19808db901d749963237817a3e4bc66e19956d37c7426e2b286f503f09fd0eed1bbd8da80a48d5ee09d03b519fdcba23d62bdc6a6d8595e1c74f0fa2f88d5ba68395531b54e992b5da28e063c0add55206adee457182bed480317c7a5542d5ebd0c679ec4ef8b0c8d95213b46958f5f4d94792dc75003b9128fa8cb3306a9785c92ab73d800741ac04fefe2c70549ea1f40f0e0d2eda14d54e857473b1470a1b81216609705a886df99367099db9028db6b9705228b2c6c1066bd325e20b94c1f9a9b9a2a2bd52134c680c702a425385ea6f0a31cbce8137154a9a831aaebb22d62f7d4fb1c7352f86054deb8f8194aaadaaaac8c97e4f7e77b164633cd876503e20d86b50fb658a3f155e1c06fbf46b99f9d90c7ca90c727037143f2ee93e1f3bd256bae06f190bd1898382d61d7fb373cdc1965a620becf432329ecd2836ad8fa822f9672683727803e5afcf876819bfcdd7c7d2673bcd1e4d64644e64eda0bb5a83fcb29314803bfc090245ff944aed473846954c237c87a61d45131ef467a9b1bf14a68f79a04c2d5f2937f2531956856eb806f622170d358c199b5183aeef4b7a7478d9303cf896e723c7637748d35714814138af0e742c3a688f91394ae71bdb78f26840eeb775eaf860e5a1509898059f044013741d4c1af9c78dd9c1b9e2f5e85db40b7739feb570e14459866353d6b7fa0385ec9581f11f3b143f68b912e8c0197224d12fabefc7804a13700cfd802c7b81bede0733ceb6ae9a28262009c0b407d8989f37d27978cbe0753a631a0d0915dae76588b9da71a3703b7333d2ac740a25730005a504651c69ee23377a161ca74d073ce7700fa457b63281aa3d86e99f1bfd7e049fb7a2b004c3074618924b4f20ce4cef8c2b02ff54ecbff86aff428f7b3a2d4cc307bd21cd32da93761c2caa4c6140ff4bd057b68398d6bea990b39199bc0c3feda94cc760a38a5cdd80fbf727bdb07e75014c769d4f581f5d335389f201886097e0a3c18596128289e840892e0979e934292b62f87b6a7b4fd5859655ec28631b789b5e562fcdd0b7e024b272995a0cbe7266c7eb6feaa7c95d470282718f700c9b9ec83da1e61239750172e0332b4cf2d1d1c3150c1d29c69032d9cda50b4603b3e8f9021002953a4b9c72991fbdd9c255842777135b69e069ced05afa6d7ac6955a03381ae91dee9b65f259a3eac16a08314d92ca1c441fe577181cd74652458c06904c21cc7b733a0382ab9e7db518dee68bfe23fee99cc372ba683c9fd6730ef1207f18507dc9f149a48b582e6f8f61c4d5687ac282c67f83533dbee944e4fb9fef2ead48a49671732add56ca49a441e7b1b5116ee4d0ca439f1bb7e9bc8777574c0ae83c9f4793c8afad7e892e7ddcf3b2c5fd4fd4419e8ecff2de55a7486d611dc611c1ffda07dc8bb86ce96dff2513ecd2051f195b3c68fde2bf91f0f3d239da3f343331bc5a9e8fb180f5bbba751b30018888f1eda26779c3ceeaa137eb32b77475a4b52f55a472fd31b257510d7b66c2c3d9f58b12a9508e0049bc8f4346c870fd76bf40a853d266379fff7be5c07e3290d40c06beb4e8273ac396a121987b5102d709d43c5108d6eade7a10fc3aa0c87251c64c2741ec2b3ac6502e919ad701289718f6a5e94d91cdc549a0f4b2716be25c232a4e0b7f279b6dd373e48e3ec38bb23c98d326d06a7a96595489535611a047763b70108f284b6b69f14701fc74bc5777772c19745d58a775e79a76bc28cae0978e9a2343d9dabb5c362b0ec0f59090c5f07e48cb3133cda177a023e4a69cd07b808da97637b4acc7074bfc74906c51ecaa473390bba33e07023048d719874380651fd4908139e18d9c5e36a0d6140b12ea3e3b85833da82eda535e3b22eee0f48aa4ebfa6f15a4ddcffc5bd196909481d5afd52be9e81cf82ef61b22286ba5400c97bad643e5b7ac8b0aae0e1018b30d710831951b5277b67872f4bd877e3c9daa07162ebdd220e22e09e53cc0db078c11e8a9dafbe90498b5a2b911ea5c927772b57634480f488beefaf7fa9c55004ace90406523126cd7eba5221108efcfc2221ffb33b7a0ccdbe56b29af87de2bbab03f02bc2da5f07438d7d2f0107395f44af9d671b0fd2f1a84e8cae5d47948aa98d84eaeac083a4abdfb00674bc813574573d1768a1a88b2ad178f4281ff4166fcf3b876dcf1fe4118fefda195ff4132b6fdd64", 0x1000}, {&(0x7f0000003000)="fb58e597c53bf46269b243dcf820f1a686f6a90110c9e15e85cb1790e2e53d8d4f08c3b71145cf4decafc6720a45758739402e3e93dd6a5a9ffce4eadc7db7bd900da68c04a666b9d619aab176c6739916211a64ab", 0x55}], 0x6, &(0x7f0000003100)=[@op={0x18, 0x117, 0x3, 0xb0ee9855d60f39dc}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x81}, @op={0x18}], 0x78, 0x880}, {0x0, 0x0, &(0x7f0000003280)=[{&(0x7f0000003180)="be32fd687ec7be7feb471bf792a8b705", 0x10}, {&(0x7f00000031c0)="378679fe6b90e0974208323dff9940e7318d22e962aedd8200bf211d9a477e2022b2de6e3f61f05d3bed418b78c8c9a2447784f7646c00f376a26d820ac72f89457664a09ebbe2f3c39d3e2fe04bc3a6c543be11073dd4bf06d90e2d9757cd70d82d0b2386bff981afb626ded76c86ec0622397e01b47400515951e9feda5254771a95cca669e9a6961169d2edbd8dafa443f62217a5c9", 0x97}], 0x2, &(0x7f00000032c0)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x401}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4a}], 0x78, 0x40005}], 0x4, 0x10004) 22:18:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400000, 0x0) 22:18:32 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xffffffffffffffff, 0x400) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000000c0)={0x4, 0x65}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8001, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x110, r1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000140)}, 0x40) r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7913, 0x40000) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) accept4$inet6(r3, 0x0, &(0x7f0000000140), 0x180000) 22:18:32 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x16e}, 0x28) 22:18:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200ed02000000bfa30000000000000703000000fee8ff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040460b7030000000000006a0a00fe000000c61700000d000000b7e7ffffff000000950000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x89c, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x8, 0x2}, 0x0, 0x0, &(0x7f0000000280)={0x3, 0x10, 0x54, 0x401}, &(0x7f00000002c0)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x9}}, 0x10) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x0, 0x4, 0x2, 0x5, 0xffff}) 22:18:33 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000000000000703000040feffff720af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404005390190745a2bdd6ff8f68010000000404000001007d60b7ef31eedf0000006a0a00fe00000000850000000d000000b70000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x13c, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x4f, 0x0, &(0x7f0000000280)="be0ea3bcde4c8c691d0c4eec33513af824a9568e777475e7a99a1fd7d3dc8613254569da272bcac024ea3f7835463b19fc4f0fd0b670a33d80bad78b9fc28a4145f69b9035eb00712ea731aff120d4"}, 0x40) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x1) 22:18:33 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000070300fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040436f50000000080000001007d60b7030000008000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000000000000000df4bfa64b7df63b7c742922f9decd699a43be458a1e7470aa457e356452a425427efd10565a47280014f6e398939b0015e14b533b85e9a0536b2d21224975b3accd82ca4a075c90fa56c21d1623e684d4de4aa8b94e8bfa92b5a76c6260a12236bd98e67675f1c27dd9e754c644af3667fafd53e1c9b9d4f55"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000700)={0x0, r1, 0x2}, 0x10) r2 = getuid() syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000400)="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", 0xff, 0x8}, {&(0x7f0000000140)="f1eb99b853d71cb7efaaa986f63821842adf42a5fdcc35cff7379c513d3555afba801c089f6a186e1be2f29219ae8ecde8595c92f97244d708467fe857e0e312aef34af589786702957a2d38c18b1aec865525029bf604a2f03ad1cfb844b32d4ee2595ec01e3b5bee8ffbb560259d2c3c86254c3298a65f5ff403f0fdc83aac222cdb712716b2d838ea41a80e2bee52e2f477dc2a68bb3fbfe25eeb182653", 0x9f, 0x33c8db}, {&(0x7f0000000280)="0923deeef127deabdbc1e5afa03df46e73d7d8b68b5798ea2a1be80de935e03ec092285311e5c447cea5b0827d9970da9f30136d89e032f33f10996f3b371a5844fd2404b2522aa839af0bbd8c6a4b884351b825b2cb6310ede2da9c2705c041790ea500c5535d492235047fca6ee43a925b2e3634257cf10716", 0x7a, 0x3}, {&(0x7f0000000500)="c1d566c3cff2ae788bbea631c3ac0b836dc020af68e47cb65ad06d0da22e7a5ba31db828a6b93c1eb22f19c3fc014748df0a0dac42f646abb7673751e5a2ca630c11f9ae676a3a3c103458ed93dfab5f097bafa3c629669c20a50339af96cf7af20dcd598b040d4289bf62", 0x6b, 0x80000001}, {&(0x7f0000000300)="78bf88011187772bdd13d8028d76dc802cd0a329b57ecf79092aa8b074aa", 0x1e, 0x7ff}, {&(0x7f0000000580)="0e56fdf6c96bc68f3ff5d9185312b7fc8b534a5a0ff1038d3eba33145cde871fd3bc0d90b735ac81b75eb567ac7765b757edb2348c255f91be5e47bc0074bd", 0x3f, 0xbc}], 0x2, &(0x7f0000000680)={[{@dmode={'dmode'}}], [{@euid_eq={'euid', 0x3d, r2}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001740)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000740)="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", 0x1000, r3}, 0x68) 22:18:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='securityposix_acl_access-vboxnet1&selinux$trusted%\x00', 0x33) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x18, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x5d, 0x0, &(0x7f0000000140)="f38a870b136e361bf333f8f6fd3172552b1f1e58e50dc03b031c6cbd70a8fa625c989851672139f2cadc69231a2436a5d650aacb5acb34beb55e076fb3a240a28459f519afcaf47abc570d533600839652ca55964ca1a4f84748fe35f7"}, 0x40) 22:18:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x4000, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000280)={0x5, &(0x7f00000001c0)=[{0x101, 0x81, 0xea}, {0x1f, 0x81, 0x7f, 0xa000000}, {0x1, 0x8, 0xd6, 0x4}, {0x0, 0x6, 0xff, 0x3b}, {0x9, 0xfe, 0x15, 0x100}]}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x1325, 0x0, 0x3}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000140)={r2, 0x8001, 0x4}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x401, 0x3}, 0x90) 22:18:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x8) 22:18:33 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x9, 0x1ff, 0x0, 0x0, 0x1e, 0x5, "b25f050d07640d9d75f00a4ce848c50556dc6c6e7bf06eae3d122bec3f90e3c60c23321fe3ffa2cd327765813be39f3f54d465fc7b944926bc5dbe0ceecc9056", "851dba63db29277de0e3e2ec79096607af1a69640508a90a186c1d4b554e71ad6298cabd6e4cf947fe6a51f4a2c39367fabee749fdac6e52af05233925feef97", "75a9d07c42b12778e69a6e6b8b628a44c1fb9a2dd997f965c16e01dee7beb17c", [0x1911, 0x9]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:18:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYPTR, @ANYRES32], @ANYRES64]], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000140), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000003000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x13, 0x0, &(0x7f0000000400)={0x2, 0x4e23, @local}, 0x1fb8fccf99ef6054) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_SIOCGIFADDR(r6, 0x8915, &(0x7f00000001c0)={'caif0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1a}}}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r5, 0x4, 0x0, 0x8, 0xf90, 0x4}, &(0x7f00000000c0)=0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000400)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) r4 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={r1, r3, r4}, 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000040)=0x6, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500484c2116510000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x30c}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw6\x00') ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000001c0)=""/59) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe255af14a4e02315, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x64, 0x0, &(0x7f0000000140)="87f95f85c43cd3a176c251401059f25caff2c3023f0adc2059670dfaf496b630bd506c4d4bebeff8c98a8475c75a04025a0929bf224e5c5cd42ed3d5274a078b38ddce13e846bb77f4ef1eab600a64adab54fbce5585c94a35c883a093526b523c702f39"}, 0xfffffffffffffd31) chmod(&(0x7f0000000040)='./file0\x00', 0x20) 22:18:34 executing program 3: socket$kcm(0xa, 0x1002, 0x11) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/\x9dero\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x3, 0xec, 0x100}) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:login_exec_t:s0\x00', 0x22, 0x1) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$bt_rfcomm(0x1f, 0x1, 0x3) 22:18:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:34 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000400)={{0x3, @name="a5210e39dcd71baa05fd916426a650c0f5fddc75e92807cc003d4c2c065af409"}, "f777c7eb175d313f8dcb9ef5b67423c62cf44995c704d4042a735d9e19acb49f", 0x1}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r8, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000400)=""/234) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000001c0)={0xcdfb, 0x644, 0x7, 0x3}, 0x8) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x3, 0x2, 0xff}, 0xa) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000500)={'team_slave_0\x00', 0x100, 0x1000}) [ 591.034115][T20329] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. 22:18:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000400)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x800, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x4, 0x8, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x14}, @jmp={0x5, 0x0, 0x5, 0x3, 0x4, 0x30, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @ldst={0x1, 0x2, 0xb94a4f9cdaa3688c, 0x1, 0x3, 0x80}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0x0, 0x1, 0x0, r1}], &(0x7f00000000c0)='GPL\x00', 0x6, 0x78, &(0x7f0000000140)=""/120, 0x0, 0x3, [], r3, 0xccf20c17e479ef25, r4, 0x8, &(0x7f0000000540)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x7, 0x5, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000140)={{0x1, 0x0, @descriptor="8611b8c2f70b72f1"}, 0x46, [], "3cf89e9ee500b2b24c5f102ab1877a4573f47137d66e8c53aef4349a8fe9b5004096f97b91123e2b3db2f160d25b04e1e6da1ddc7333a6d1b444ff110bffeb5be4248f77c3ae"}) write(r2, &(0x7f0000000340), 0x41395527) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3ff, 0x1) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000600)=""/224) 22:18:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x120, 0x0, &(0x7f0000000040)="b9010efffff000e7d15e00009e40f088caf3ffffe100004800630900000000000000a3", 0x0, 0x100, 0x6000000000000000}, 0x190) 22:18:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x102, 0x6000000000000000, 0x0, 0x5f, &(0x7f0000000000), &(0x7f0000000140)="0f5128ff6284d9e12b6e6a9af85ef281663ccfa9b0614e261715e82299990170119e74059e850fa7f16670d0b838f0dc596cc93b4323114421a21956ab54d15b10938cb3e9474e5be470e66bdde761b2e816a3b59b612e57fa5548b4365c9b"}, 0x40) 22:18:34 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000e5000000003ae0a2cb4110e3662b5abc581b753a30586b7531061c11ca3424a9b588817410a02b911a44ca00d9dcf1ffae44a6ae55418899b295457e35893da96b07b45118a3892cac0677f34a4c35c3c128c825c50f453f0b5786e213e4745e8276f87820a1152c8fbb7cd991a7870306d17be60a494458ff8440caf309f9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x3}) write(r1, &(0x7f0000000340), 0x41395527) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400080) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) 22:18:34 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4d0400, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) statfs(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) dup2(r1, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000280)={r5, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x3, 0x0, 0x5, 0x6, 0x5b}, &(0x7f00000000c0)=0x98) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) setsockopt$inet6_tcp_TLS_TX(r7, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r8 = socket(0x10, 0x8000000803, 0x0) write(r8, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r9 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000540)=ANY=[@ANYRES32=r10, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adcdfe7ccee80af9d165d2370bfca2f75f272e12b871a96"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f00000000c0)={r10, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000280)={r10, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000140)={r10, 0xffffffff}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000440)={r6, 0x8, 0x8, 0x8, 0x7, 0xfffe, 0x9, 0x5, {r11, @in6={{0xa, 0x4e24, 0x7, @rand_addr="45aee20543a6a6d77837db78e85c31e4", 0x1}}, 0x3, 0x80000000, 0x3, 0x1, 0x1}}, &(0x7f0000000500)=0xb0) r12 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x139682, 0x0) ioctl$sock_inet6_SIOCADDRT(r12, 0x890b, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x1e}, @dev={0xfe, 0x80, [], 0x22}, @dev={0xfe, 0x80, [], 0x17}, 0x5, 0x4, 0x4, 0x100, 0x5, 0x80800048}) 22:18:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0xfff, @empty, 0x1}}}, &(0x7f0000000700)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000740)={r10, 0x2c79}, 0x8) 22:18:35 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x4ed, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @broadcast}, 0xfffffffffffffdd0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000003480)={0x0, @vbi={0x1ad14df2, 0x1, 0xfffffc00, 0x35315258, [0x2, 0x1da2], [0x6, 0xe5], 0x108}}) sendmmsg(r1, &(0x7f0000003400)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000040)="c8a69ec5c51562852e16938fa9b20a28008c5c8e3ba3ce04580287b069fadbca6d0ccf7e946fb39da815b0b34a83de6df4d5", 0x32}, {&(0x7f0000000280)="795ea76a297629fd340069501cbb3c4014773e4c9e9ce86d05a7abe4c8c33accd8bf3644768b65906f96cbc4faa97403e39f2e9381841f51a204d3c24fe51304eaf234efbc19370aea7b2fa6ca79818088eb89de1b0929c5952a2e725b5d7d23b72bfc8c88d57c70cc4739c66ee936f784af3b9ae171285d88094b49032d", 0x7e}, {&(0x7f0000000400)="f9028d8e3553d6ce175aedd93d7ed60576cdf38bcaa85650300b2f46e36ff3603b0ce5126b9fde55ec1f340151a997e0162407e93a7280fd1bd19e21863ff2c02705180164a8363e513e1bec12b52acafea9e6c7f5322b69a46b4645246959e92e499ea0d2d6d92caf0ba0d97fd051ccce4594d8ea3dcd85f655abfcfed7475d6d03fc57abf3992ddbf8681788a8fa091766ae6ea3b62cc1bad070dc32e280033caa1d8d70e9120794b8d4", 0xab}, {&(0x7f00000004c0)="d5cc85f8326cd22a70879f26b4b62ada010eba340e75d0e9124e75c7a6c15d2f152897ec58b0c8676550c194ab4a19bc59ef51f3af154c69972c50bc76c368ddfe4e390a545d1dc812426e05be0d9c1f8c620e80a8d7726f519090d479eb0397e162d0f839772f6e2301872d7597d2ef0389acced8df2ea0a90280f7e16ade15d1d1b693ac173261de8b9da10698fb63ac3d0890413ba13c2e6dc40663115ea337926cc25103e7f68706f07915be5789ea8ab96a77d1c1314ded31ccb68b39eb994f5ac37daeec98865095272b19eaca4ee1455d95e798d2fd29668346abd503", 0xe0}, {&(0x7f00000005c0)="5c1e3a3a72ec0a4c399310da9104857585bfdbd2d55ba2f483770fa2f7f7e3886ac1b11d1a9b1d2f9544309bd283a4d1ddfab91c3c244b510d338435be49b4ab6249bf291a6cf1bb699da193dca874d00116ced9c69b66b912b067865ad1d12d9e914cfeba6e3fd835853afe34b5bd847e80e0c2ad38a80e320068819f022b90a1012df6c312556453235fff0881d396bfb552ae39589e312df7ef195277ee128beae209f335d430f2533fe802ccfcce431b8293a22d25c4640ff0cff3e85c78a371b264fec438b80d0a9139384e3194f9508656bdc49e60dd53523c2e8f6058acf5427917827ef9601399fb2d4cd4", 0xef}, {&(0x7f00000006c0)="e84dcaed736fc9297cc382ab65054c47d05919d019fa05a5cceac7c4c66c075d82e270b13d486725a5c5045c022f5c4cb40efe3fff0d3bc99b78fbe0252c260b9387f7464b29d06ec301ed9e52e965b6e5f6eac21ba1fd09315b7c1cb7b7a8baf5b2c34847e92481254a8de5c0da7e6fb985058855372aefe34a075d0d7b4b2b023511c103f7ac421c1ad3003bb5b7ea530a3335d7cfc2e92a4283aebd609f17d2160911871c0a14818e143119c0ee6f7db9148a1a33dd7811ac7341c8e1c2a1374ba1208690a7b6bb1ce651060622a0384aa6e59b", 0xd5}, {&(0x7f00000007c0)="ac0f5b55f6dc217ae322b58f550c32f90e281a9a1e2ace7180f57abe4bcbd67525423fb73c2f308c23e2231a0276dbcbf2afccff0367085807492b568b14766225e070bfb4f64788e80c888794205e16036f22593088bd0b45796976a1b75e267d2faf8f166ca62d0de65ceb71ccc4c602", 0x71}, {&(0x7f0000000840)="3be9a9d4f72b0d47dc7355e9588e50cee4af7f4d4fb7f414289ee7a8de35f9e30b13d5e2f4689ecd95807c345bb74e135b45995a428fe0a87dd9ae3991da41eae5783dfc491cd12ef1993c", 0x4b}], 0x8, &(0x7f0000000940)=[{0x90, 0x119, 0x7, "87e502471ee98b37591faa5e41ed82fbcdf1b9aba85e3789011ad6bd4944557a442ce444fe6b7d446f67730e9ff1bae1f9bb16e1b4f0d2a3d584860363e6834ff3ce2aebf34c1287e698de4e71a7340bf3a83092f917aaee30dddf211fb94e18ef79c3c68e78b92dcac81912961718f74bf5ca1ab3f47cc8cd46828becaa77"}], 0x90}}, {{&(0x7f0000000a00)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @empty}, 0x3, 0x1, 0x0, 0x1}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000a80)="27a62e57cb5c5c15a0a2a1bfee560a7f4220bac7081c34962d965f342eb69d0bab0d48e87293a25ebfc40cdecb21f463765a57525e811ffebed6edc80329f97a74d69bef987a1301d95b48af3c5dfe877dfa6b1844e832c32626a4c367edcffc466f2407d0905567629319782626e77bbdcdbe7a4d40ef714e726dd266489233a5a0c5f18e6704399a9d4673e09ba5edc23e16b11fbc479ece91d22b02f9490281da3b526d961747cc5d0fcd3a3fca5170fe9f3f0e5451f0297b6d6e9fbe73a2de088caeae6e9df6e30541b8179960e4", 0xd0}, {&(0x7f0000000b80)="0d7325549da8e44d9d73bfd55ae07325cd6e28c29c53dca95be7998cf90ab60753beb3418ee297031370b88021552b17713a868398d837878a04cec58238863defaaf3dcf3c8a41eab2796b5c958834517d7dbd5d19c16e72f18b8fbff5904159da22dff9e86446f01ffd668d2f419fb975d6c42340ab9775922f3c0b8381cd7527b8e3f5924d1aa49fa06691ed17b4fb6ebf8be8a2af3a791f2a5e72fa0b2d698c0cbe0c9fbb3efa09a0279982838ab766c375a204b9f", 0xb7}, {&(0x7f0000000c40)="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", 0xfd}], 0x3, &(0x7f0000000d40)=[{0x1010, 0x6, 0x6, "19f739689138f63ec55fe83e28a0810f323b33158e77060ca8e3f3f7920dd9efef6c72e3c17ee2d6fbe3855df7660d647549851d65d85ba81042ac0ba88b03832b8ab0be9bdbe30607765e701666b67f87bc5e66e22e7513fb1406467199bcc1e276b506aec5452d1e991d5365e8c57c2a25e207448c95fd6f5da79c062c33c2d9b885fd04a4220ffbee078fe8fb569c2ce8acb654ccd1fbad127724174e750d4757d21790af296c8dba0241066b904198f765953f149e742283efc41a56f2f93e5638ebd873b95833ef7190382f6770e3f61fb9b46ba69efc6d9c561e968acc6c831a71b82f55cfdf2f84a31a34a9f12a0308b9408f438f0a9752863d762b02b0e4fd0992912b615a09ee17e8763ac140d26f928a84f8af76e2373abab7e0db3403e67d1094e024dd2333aae28acb6319e31404d666661277aeb91d1dc347d65f293826b86752f3d049ee2377dfe624cfca18bfbc5f2c6d53560685de25bf976bee0d786e66585e9bda622aec9d62028f02d0471a887ab98f74c0f30a61fa7be7cf64947b71df0aeb00b7f2b018094b05c5ed184ed806f8a97a7606412ee974b41fea3e867a04a8eb426355993a625af122039e13bc4ce74e8eb153ef3bc85714d201b260eb13fc7d807bc7a6ed062f11cdbb1d9a46909fd31529fe49df784adbe033522accb1525e1311c6788f35fd50e6a10ac5cadb9bac53c7c771bf79c4ad655a83cabca80f767bf4f537a8d1ea37884cb842c86feebb790896fbc181f9596e830c72a648e00edd56dbe9935ac0d6fa947e1d161b8c6469668c7e0219b885a30ceb4c6617fa4f6049024980ede76467bbf3e847cd43e651d4f81c0315ff1c0832a9f7b39df1cd3c952f265f34f1d39e039cf0747201428fd1f437c58c526e01e691c6fd5f759c15d1b85a18c66fc56dedca6dd719ef4d980b607eb49c34d6b58488f331df0e6e08ea8d6df8ae71311386cc6dfb8e00bcf189d4ef55fc45d0a729b16459ea6b816be2173bb5b8f37df7da453ff6e98259251c81f3d9afe0e797cac0c2bc568b8edba412fa9f7ba4338796881efcc75e64d6382815ee9d7d5422fe32b9ee366955ae94cd32010012bb13fa9a986931cb93663f0f4b2aa210406f74252bfb20a3de2c0a41c6633264f0782738781944444eab347572745fc744f16c4cae73e5fbbbe90d80c128f444bb8e5c4c7a8ff52291a2e7877875829dcc62704d8513a9284dd569bd6f56c456d18b9abc2df06314d3057650e6063a69f5b91c1330d0994f24763ab37f0329a5368306bdf82c10d6235633ee7ba1ee2598fd93a632c0caea383bbb834065d86bfeee7541e81f9f3264748dc9b22c8f195f3e8cf432c55a29da1e1b767252588c48a0ee443ade1279df425fed793531a0c2e28b55b71e01d4831118cd99fd25b5a6d4af1899c8b4ff0505e2e641e31430c41dc61d0323a4b3a1c82cd16378488ea058c112ee06d685f807028309fb5915e5bcc55b85ab65ae4b0e2de5fc5259b4ddfc8d0f6cbb9bf4b8082b53203fad0d4524cb5204296ca3575f72ad05a871b0aee5fc3216890e914e82b07e403aeca2a916122708239f6c9d86971f304a5fb926181ab216f50264a2556c647ef0501ec455980d6375d071f22ae060e341c711638938392a4c5cfdb98a02b9b699bcae49426e522310275f376d587c6f6888538d53f17bed0003b13c0d33d7875664f47431976df486116c6efaa4b428e71e62b762db7c68a5c79cb9ac13533bfea4c68e2f32b4419954af8eb1fab9053fa5f60db0acf92cd10e4f6c8f7297813531fb6a2b5da34a78d62308f0934fdeef5445434ae93319912361a42a9d1b2760bd1935ca09256bd97158f1da1f3e39c1eed60cbf0204526f2dbfd3688f21bfac33404ba8bd4fccc2472acf5d1b25f29be3e094dcace94fcc88d17a8f88889ba226c6d2ac17b6214df36440e24fe380404da8b5a4b0aa9039ee32d2dd95e249d25b9f299b3e46ae3798e091ac9732c7b0554097ec8e1127a8b91e1d27a053d442080b03d0d5e6ac0f4717e7c70bc4e1abdd773da58fe8e11932b9021ef5d1f2f20654b5fda0768f97295187a5caa22e4bac36800feec45d579ae471e54a8abb6351131bd4760b4c02f5eb13f35f925765a4db4994ec2ae1526f7705c2a0755bf4653df4a056dfbaf7bc468a2812b2fc59a130e9e06c45c3e9ab3b9795b9467c6d08b384d03e1cf973bbfe80c0a10f6d7fec06ba240e44047d53519a50c798746a62b1b89715ba235443b1d1eb35291ee461d914fbc1561880c24c2fb1435c0806cca8fe5bf9b00df37f2a99a661eb00e431c61e93be06bcf7d2eb6c426659dfd95532647a003655f5e83940ffc39135a287399cb6aaaa02492b51e9bcffb77175be9b65623e923a934b117e8fd4a5fc46f2b7f0ff02ec70bba1969997464bfecd4d878d4fcc980c8186d03f993d251c51ac2d6dd0b0b66b91fbcba7f30a49937e6a708b181d513a2ec98c0f51462dcb8275b59d530ea058a9ffaf7615ad162b1314ed1db7e6103a08b2a6e55d3e0fdee347f290e51c44dfbda9f954be009908604e1561814d61cbd45619353b4ae22e9bd0c0165f4ca7c2c01074aa9314dc0e12467a35ecd850dd582ce102940accd719606f616491428c31a3b0404382b75f4fdfcc05729f0cceefa3ca3dc301214b5d4b10f2e88f12413054245537c1894bbefd679028b92ae02e50c3c58b809f1bceaf61f1677f52a583b5bba2d020823e68e3d3e15905766d4973fbaf04e1f25355565377114c8d5fc364c5a107186f48220dc56308b523396320e178e97bc68c4c75022c3ef95dd2fab458add47c87f877f1d5c8ac165eed04728c773e25d2fae9bf015c192a44f9f44ce6b3afa51a70d48d7885733abbb09fc1e67682da8ec1098a5193ada0c82a6dc1b4c5da2f3001e438fdf0315cabdb080f309e1e612fe5b496ce244f46aab966b9c7ff80c605457faeeb948d6a99a9b7ac23680a256b42b2ee900f2217b9a24cd031a4a20a65c03c565510b8434b3a48782ed953f57e11007fc9ac72b762f6792a3b60f6097e8f5311cfe031058886fc2fd5e4f6462f0938c4b78b9f6cbda73380ea148d24f40a7d7f67f90721a2a7e93486a7d7f93e669f42f8cea3af1ef72f96a3adf260eaf81ffd54ae71c25981deedfe6b03f2185479e82b59220f721b0c4f8d24df435ba0e17eda7c2c744e53ba34f4587066b12a7fb08d8b725618a819565b4977f59747b88525639bac64d74505cb768855a161638b7e78885faa7752355a7ebccdd85c0e9118a06045ac49b03d004d03004c82ae11a6cda1e8c83dd6d4b623a867f5ae502522e741a080d882f3c91945ae9188bb344c3fa22ec343a96622391521517e56a00b48f53352c154f3b58fe3b2e849082fe73a2dfc2309e441ccecdaecfddf5f16e04afad383374c936077aad937195f13272e2dd9c7499770da68f8d354424fb2faa363ef4a15d415827f1f5afb0d6bede1cc8b49add44a9975c92a8f588e466c476a6daf7e0d9bf9d366ae14ab48442ff03c3d84038ad60242352d8c3ed751e07954134cefa16cd01419a57f5e294f437042fc7f1ad20876d6c579f3a41a0d5292e691e9c4621b1406602b6948ec9d0bfc37af290c283b0aa7d28ef89dc36e29ef862dac990e9734ae44fa825a25d211bd5699bd17a7fd08ebd5ca8af8c47383da52e3ffd6cdaf634bf4497a61de6e51823c11869a752569a778be601e661633babf7a5dde630490dda413a3e25b09a833b9e8bd5dbf8308b88fbf14b4cd82051f1996d9d72c1814e0ea4d09d2b2762d3b3091a48deaf11393e13db01fb7c84ba7b599c6837ff5bbd9e48e63150730dfc11cbb1c9297e506b92589851b3864c0fe9910d683f64c7873c8bfa9a0590d0f19ba22d0a6f838d65aca6f2ca4ff59140f2242c60bffb9abe7397b5c95769b086b18c1d0f4222156e4a23d9989dca8b73d77639e2603068f1eaebfb85a445c05213695afe0f3f8bec1f9c0156268eaf2ba6ef908aaea163a76aac5a74c17ac9a821296a0c8a55d25588e8755223ba3ac8ee9cbe810d1dbf2615c3b7bb47875000e4da9fca8ef230bacc3e9e0c21a6493b51de9765ddf7af1e02fce5fc282f294ab421f24d431995f0f9972ec00f1ec224893fe95070dfd8456bb8f0b9662de29d2c0015e17ae00ce38895243b822d798157dd1117d0fddba2cd88fcf39daeb148b4ae35d0a2de618f4ee06e0e26ca73c28b74f0ddee68a9b969cd772ce23674cfa2c9534e0673818654db5bd88006fee5a138ea607f28c984e04a3a746041281433cfb0910a2709313df0cd09fe52995acce080be6c937a4d503fc39a7f4c98983c8c01172709d7c58483d1846a0b1a46f8fe614bc7cedcc25700e6c5ea797da2ff8f2fc9281ed596fa337037e9df725ef955f85413475723efd0de67f727f13ef8a68e5ba1947b1b8da4fe096c1cb07e79f366d5ec3042a6bd82d32cd5f2660ca6547f59e99ea22c46f276c2331abe11bd9eeb8326c6547a30a1ccc11d202a979e251153c0416e859204688cf0ae5b87bb6c0d72bc7124cc28203b422267459d526036b86a3798533ea39ad364f0ea6d305a8c2c00ebec3bd0892e83bec14daf51075adcc62ef432b56b08c3f5129876591056d60f87c1803b357886fff2daa1febb81b90f9061f798cb5c25e0e50ba36dd037e89055d4978a24322d7cfc5ebb267eb9aa2ccd0f0ca5f8817710cb4c822949f4408bfe9114417f1de7154b0ca5e915f8c0cf4534796949db26bb7bba7fc71bffefc4c2cd492eb00cd7a1aa6633eb06653a7628a5a147b9796c2282abd8a52298ee9c1a865607792a925f2c6ec3e7d4e17615682c5232cee8f9bb752e0cfc36ef2e0b4d360cd89177383cfcb2df4b279b65e9091bed52b603f08b57f919244cb61e718f77844959cfa01440bf30625b268c74fd2bf0fac62c5ce86b92977be9c604b019559b4014afb2f28e4b9e8f22a7df3596dce5d2ff592da280e5d6ef3a67cbbcae645ffbb6246ee1d7afb4866f01d1b60c6b5a256f60fab47974327f0fd362a6eb332f8085bee9c4a22dc051a3a0dab6f1e52387e82268e7e0beda20175ca812d67668ca1d1573bd958aef4b8c87fab41d84f5efad47adee0420addec38677f988da14c3a3ce3b77e39ffe4f87acfa06ce040b49fbb9fb3a4af523246bb4d1ddf07605e10b53f8a8cb1ad854a649bff863d01ae9d8fd84ad697367c24910b934f23a73631984c37339281d9c2bf0173cd0e4204058d95117bf4bbc35337bbead402d0bbe311dfb188c86e1bfb2a867b2fcaaf52947532bbcc4cf2933c93102ccb7a3e973cdf3025f5e7838fbeb43bf9352459c8dc6d6e2dda090093d7ab5de958a110d879fc0665ddd18840bf08e381d1b23f6645433250d3d6f6b1093e1ce42ead8937a50b18351fa06d692a5c84d9a3f3e61d32b6923daaf0f5e2addcfb1c6a33db5aca67bd12a35900fe18af422c707092bd3d2e10a96460bd40fa252877285adb02b68244790c8a62f69507c86085b8072e01fc9af1073970dce87603d5feb659e2f8c1936f788f61ba1ee15e19edd0d1bfe728264b3f54d442248e6d5be9978218a07b002dfaa1f6c8dcb09effe797b93cd3e40304f3da8ff298c0bc4da0a2a02e05d208b0b7de336b2aa6df1d752f164c5379d307db4552c1448a144723942a26e43e9b2582b98a6fe254f567af919d6a85cc7ae878d5b647fdb094f0cd96f1e3e050f13df908feb20d8e09ed7b17763c39b804bce46e64cc"}, {0xd8, 0x9814678960cb2ab, 0x10000, "dd1b6471066cb6edbc369a6bda9eef49182c068ba7866ffda8e8682de6ba2164d9e80c2ad0548938900b4f5d42e52101c8f3a4946a0c13b66f4d1f831c2e235fa924301740893eddfc32f8c62d8b114fb252f4cb323614b7b00f8aef99e513e43e8a17f62273f350eed7651e50117a66326330e8628b81545c73913f63ffa3ee498d0aa33aae3338f67ced1b59e170057fe300432f378c88e3f479b69b823df2bf876d6760282ee1573fe9a585ac5f0a11792678c3bf25d68d270192045fb989ca9d26e0899b84"}, {0xe0, 0x4, 0x200, "03d103ad7af9ae7806fe2462fe109af67075626c32b4cc51e9c879def04bd25a4d196a8d8453895ff7919d1ec6289c8c4a36fb11c34e5b19af759ed1e6f584f915ca91cf8673d8d6e04284dcaac8c68456d65ac0c421f7b0946a1429f59a10090756c21fb7a94188fc88153cbf521cb59151d4f0051911b2634cfc6f36c814a13d11fc4d2b7fb9dcae78a5d62afad5e2c61c2d43d509c6eb6712128ca6ceabb93f2331f46b7b644a127215d2fc141199a1a1e8c760612e44b2331b62080f3aadfe3295666cd2fc15ebc8a4b4ef93b6"}, {0x110, 0x110, 0x1, "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"}, {0x110, 0x0, 0x10001, "bb87f939e79e21e530afce5f296d518e8f636d25f518bc101305eb6927b4b3278131fe1bd79367416eab29832bff9e985b899397815690d77a58be380d51508814e948915aae9aec7aa65bdf27454e2485245cdf466fbb880bc49a2e98b8d780dbd09c753bae73a75de5f7b9053f5458193601fdbf2c56e867a42a5363dcca3e2d0353b5c1d4abd632620d931c1c37b446089613bdcdb77c48db13c624632c9997fa187b6ede460b4ab622437256f0e88c7e14fce5ebc23a9ea8e1ed147a9fe6365e6f1a8b03ec33a9dd9a5738146b6d9a70a05f863d2a615c36d540e152d9a1c0fc36bb6c91f4b83e7ba521f381f2aed62639bbe8ab5762f4"}, {0x80, 0x113, 0x1000, "86f429b34182695d01cdcfc54ee5a0f9b0ae8bff5b879e4c9f46fa0ac8b838682d8f0c2816850ac99c7b88e26042ce0bafc94a7ee5d7815d9404042d85a8824afa45c60e0fa32920f9f344c2b8ef90cceaf9cb026aabe0a4594c6047e98c39cb016c17015a0f7ec096"}, {0xf0, 0x113, 0x5, "6423dbfdbc2ad76ccdb8135e5f1926c4ac38c4076ab2c0c737f09aee842170dbd1a0ad5c95425100ac278e0b87b3a6894f72399a4584736b6e0fe6657ab807bf3b05a30d58b36db3da3c526a89c70f9d2208ebb4a52da98b721845a1ff363ea64589412d8028bf375c44a59e2596baa1c90d1f02ee65812fdc7284655815823ef4a3c515ca4a2266b85bafdf52630abee82104b395f45b102dd02f6329679bc8fc957f93163350757eb721fbd8614c72c2d9569e2055f23b2e79d197b5e75617788a46a3c899a8a29268be9ec1c809094ebf194bad1b3bb92252"}, {0x88, 0x88, 0x7, "b31ab57b3dfb9f8eb1b11ba9996193193233e9b0ce6ddea4f6db1571036b82c432e8174d3385731f0910589104e74fda9c548560ff653a69ee36937e83e5451657f3c6aa0fc94a4988709c1637b1c8f2abbac7755d8b6dfdc60fbe6b247d0bf272c65f4308e44a94d92116edb6f40ae362b0cca4b5d8fc7e"}, {0x1010, 0x109, 0x600, "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"}, {0xc0, 0x32e, 0x7, "81c118c698fd2669bce3448bf5e121db966722880dbd84dd74f68448dc58d3c6d2a0ceaa5f2accb94080fc2b2e8f7b3011db00b9bb6c2b20621666b011668269109ae36d2ad134798320f5e2c815dd91cc61ec441d8ff51dee5cf0373cd558b04a2ab3c011feb4730bf964e1e6b685181321fa721886bae24562d2a1e3628bf4301b1415a023066b03cc5f5ca36062a7fea6f37cb5fae569af9470ce8b4bc1cb87e1a47abc2f4b184e0e43cbf6c4b755"}], 0x26b0}}], 0x2, 0x800) 22:18:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b7020000030000a8e47a54d2e1511de953baf6e69a00bfa30000000000000703000000feffff7a0af0fff8ffffff79a42d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005527665043b1b80bd5a59a58e7c3bf1fd52967a8fed5789bc61961c362cb85a820d964d7fd0d742b4cd8ddd9d42cb262bc9e4f9f0c0d1c103d0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000004200000068398885ed40152bbd7000fcdbdf09000000000e0d923bfd3df8463fd5258b2d50a6b7404b537959d56126b033e2559928bfe00df340cf3e8a5469d35d93928f1432cdcd1a0f24418a1b221f70245aa8f1d719f1c7946b71d93b49f0c03e6efb9bf91464853305d22c2b722443262be3de0a2c1d4622a35b7e2326e85bccfed13e91f20318fc762505f92fc0953d2c9b6cf3ee56c96f75f65ac7746f7363165a84dea19bd0813033231275074e14bb4cab197c6e344f"], 0x14}, 0x1, 0x0, 0x0, 0x812}, 0x40) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000040)={'vxcan1\x00', {0x2, 0x4e23, @empty}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000330c000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000001009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 592.242506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 592.248331][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 592.254133][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 592.259895][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:35 executing program 4: syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6f, 0x3c9f4d9db3dc6e2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x0, &(0x7f00000000c0)={{}, {r1, r2/1000+10000}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RATTACH(r0, &(0x7f0000000180)={0x14, 0x69, 0x2, {0x39, 0x4, 0x8}}, 0x14) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000000c0)={0x4, 0xbbe0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) sched_setparam(r1, &(0x7f00000000c0)=0x7f) process_vm_readv(0x0, &(0x7f0000000140), 0x0, &(0x7f0000001e80)=[{&(0x7f0000000a00)=""/138, 0x8a}, {&(0x7f0000000180)=""/96, 0x60}, {&(0x7f0000000ac0)=""/225, 0xe1}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/185, 0xb9}, {&(0x7f0000001c80)=""/197, 0xc5}, {&(0x7f0000001d80)=""/101, 0x65}, {&(0x7f0000001e00)=""/67, 0x43}], 0x8, 0x0) 22:18:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xd1, 0xa1, &(0x7f0000000400)="fba85206542e5c5714ee60a30a480f62106181ff5d464440bd62f67557677a744529fc9ac5c1e89971b374f20ae2f9cbc543fdb7e2406f32c345950dc4e4954b4ccf70fdeb8663a250c6171fb07134f98ced35375101398c8c623853a43b2e5c102b22c7fdbef08955df52e3a42c23e2d6587ca9bbb39141c51ecb2ae5ef3c206184ae4d0f6604b1cff3267a80000d273b14de635667bd367411ca7b2a3f2abeae385fb69cd699fafbc606320d8a35b5ff84c886b603dc3c636a41a10d719aa0d30d57c58e18420ead36687711bf3f726b", &(0x7f0000000140)=""/161, 0x5, 0x0, 0x30, 0xf0, &(0x7f0000000040)="1edea981beac902bc77c1e76af40db158bc0c641e6f0d173bca38c4b0d4ec29494b612dd39d33f33120243c770b8dd8d", &(0x7f0000000500)="7e15cb3f15dbef8cf9c7b1a61b55344bdecd2b1a07a2c5681262348ff281ae2fe2ad77df8d26ac3f62284a28061f9dfc1a19098ca9f1c87ac0c438f10053182d21d2ce8660b5b5bf430577983b2b84fa9cf3afb0830fcbbfb63f445b22cc21271b826ee424cb1813ca3f172a3fbfdffbd171ded8fcfdee1d2b9c335482239b09eb2943bf5c54287d2ca3f0ed1667fbf92142fc0c785d44ed4b8b65db39493e8fb2a2687e1582ddbd7f6eb41eda60c59d98eaaf6ef4ce27fabead57830566ca63fbd3dbb4b022079ffca83a07f3c092860470cad7d359a7937b44bd9500e5a65f1e915ed822450b461f4f8c32dbc3cf67"}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fstatfs(r0, &(0x7f0000000680)=""/200) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x18, r2, 0x6edef1aba009ba97, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4b0600}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)={0x218, r2, 0x800, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x257f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xb0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40000}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2f99}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x885}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe06}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xd1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x54d1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x88}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}, @TIPC_NLA_BEARER={0x8c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'teql0\x00'}}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x43080}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = accept4$ax25(r4, &(0x7f0000000280)={{}, [@rose, @netrom, @netrom, @netrom, @remote, @netrom, @default]}, &(0x7f00000001c0)=0x48, 0x785c2d93f8ac0eac) getsockopt$SO_TIMESTAMP(r5, 0x1, 0x23, &(0x7f0000000300), &(0x7f0000000640)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x18) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r3, 0x80000001) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev={0xac, 0x14, 0x14, 0x1f}, @in6=@mcast2, 0x4e23, 0x0, 0x4e20, 0x24c, 0xa, 0x80, 0x20, 0x32, r2, r3}, {0x6, 0x40000000, 0xda5, 0x10001, 0x4, 0x6, 0x6ac, 0x3}, {0x6, 0x401, 0x3, 0xf586}, 0x8, 0x6e6bb7, 0x0, 0x1, 0x1, 0x2}, {{@in=@broadcast, 0x4d2, 0xa5}, 0x12, @in=@multicast2, 0x3500, 0x1, 0x0, 0x50, 0x58, 0x1000, 0x2}}, 0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') 22:18:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 22:18:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300000900000007ff070000feffff36b7f0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000001b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060001ffffffff2d640500000000006504000001007d60b7030000000000006a0a00b700000000850000000d000000b700"/101], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x7f}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000040000000af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640000300a000000010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068dbbca289421f8e2ae497505b9d4c3fe4584d34c7ee0707f372c230a9e49875a001dc7060"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x20, 0x40) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000900)=0xe8) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000b00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r11 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r11, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r11, &(0x7f0000007d40)=[{{&(0x7f0000000bc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000000c40)=""/4096, 0x1000}, {&(0x7f0000001c40)=""/139, 0x8b}, {&(0x7f0000001d00)=""/249, 0xf9}, {&(0x7f0000001e00)=""/80, 0x50}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/30, 0x1e}, {&(0x7f0000003ec0)=""/85, 0x55}], 0x8, &(0x7f0000003fc0)=""/177, 0xb1}, 0xa7}, {{&(0x7f0000004080)=@hci, 0x80, &(0x7f0000004200)=[{&(0x7f0000004100)=""/195, 0xc3}], 0x1}, 0x4}, {{&(0x7f0000004240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004840)=[{&(0x7f00000042c0)=""/115, 0x73}, {&(0x7f0000004340)=""/29, 0x1d}, {&(0x7f0000004380)=""/196, 0xc4}, {&(0x7f0000004480)=""/23, 0x17}, {&(0x7f00000044c0)=""/51, 0x33}, {&(0x7f0000004500)=""/45, 0x2d}, {&(0x7f0000004540)=""/114, 0x72}, {&(0x7f00000045c0)=""/68, 0x44}, {&(0x7f0000004640)=""/206, 0xce}, {&(0x7f0000004740)=""/231, 0xe7}], 0xa, &(0x7f0000004900)=""/199, 0xc7}, 0x9}, {{0x0, 0x0, &(0x7f0000004ec0)=[{&(0x7f0000004a00)=""/42, 0x2a}, {&(0x7f0000004a40)=""/209, 0xd1}, {&(0x7f0000004b40)=""/197, 0xc5}, {&(0x7f0000004c40)=""/7, 0x7}, {&(0x7f0000004c80)=""/63, 0x3f}, {&(0x7f0000004cc0)=""/37, 0x25}, {&(0x7f0000004d00)=""/234, 0xea}, {&(0x7f0000004e00)=""/55, 0x37}, {&(0x7f0000004e40)=""/99, 0x63}], 0x9, &(0x7f0000004f80)=""/148, 0x94}, 0x4}, {{&(0x7f0000005040)=@rc, 0x80, &(0x7f0000007640)=[{&(0x7f00000050c0)=""/208, 0xd0}, {&(0x7f00000051c0)=""/46, 0x2e}, {&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000006200)=""/225, 0xe1}, {&(0x7f0000006300)=""/83, 0x53}, {&(0x7f0000006380)=""/4096, 0x1000}, {&(0x7f0000007380)=""/205, 0xcd}, {&(0x7f0000007480)=""/101, 0x65}, {&(0x7f0000007500)=""/15, 0xf}, {&(0x7f0000007540)=""/193, 0xc1}], 0xa, &(0x7f0000007700)=""/165, 0xa5}, 0x2}, {{&(0x7f00000077c0)=@alg, 0x80, &(0x7f0000007bc0)=[{&(0x7f0000007840)=""/21, 0x15}, {&(0x7f0000007880)=""/119, 0x77}, {&(0x7f0000007900)=""/158, 0x9e}, {&(0x7f00000079c0)=""/183, 0xb7}, {&(0x7f0000007a80)=""/70, 0x46}, {&(0x7f0000007b00)=""/145, 0x91}], 0x6, &(0x7f0000007c40)=""/195, 0xc3}, 0x3}], 0x6, 0x0, &(0x7f0000007ec0)={0x0, 0x989680}) r13 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r13, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r14}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r15 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r15, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r15, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r16}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r17, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_mreq(r17, 0x29, 0x1c, &(0x7f0000008480)={@rand_addr, 0x0}, &(0x7f00000084c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000008ec0)=[{{&(0x7f0000008500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f00000085c0)=[{&(0x7f0000008580)=""/55, 0x37}], 0x1, &(0x7f0000008600)=""/220, 0xdc}, 0x40}, {{&(0x7f0000008700)=@nfc_llcp, 0x80, &(0x7f0000008800)=[{&(0x7f0000008780)=""/121, 0x79}], 0x1, &(0x7f0000008840)=""/103, 0x67}, 0xdba}, {{&(0x7f00000088c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008d40)=[{&(0x7f0000008940)=""/58, 0x3a}, {&(0x7f0000008980)=""/194, 0xc2}, {&(0x7f0000008a80)=""/36, 0x24}, {&(0x7f0000008ac0)=""/164, 0xa4}, {&(0x7f0000008b80)=""/104, 0x68}, {&(0x7f0000008c00)=""/174, 0xae}, {&(0x7f0000008cc0)=""/17, 0x11}, {&(0x7f0000008d00)=""/9, 0x9}], 0x8, &(0x7f0000008dc0)=""/215, 0xd7}, 0x190}], 0x3, 0x40000000, &(0x7f0000008f80)={0x0, 0x1c9c380}) r20 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r20, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r20, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r21}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) accept(0xffffffffffffffff, &(0x7f0000008fc0)=@ll={0x11, 0x0, 0x0}, &(0x7f0000009040)=0x80) r23 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r23, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r23, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r23, 0x8933, &(0x7f0000009140)={'vxcan0\x00', 0x0}) r25 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r25, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r25, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r26}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) r27 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r27, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r27, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r28}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000009180)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000009280)=0xe8) r30 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r30, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r30, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_mreqn(r30, 0x0, 0x23, &(0x7f00000092c0)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000009300)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a5c0)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f000000a6c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000af40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f000000af00)={&(0x7f000000a700)={0x7fc, 0x0, 0xe93, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x67bd}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x100, 0x7f, 0xfd, 0x4}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r12}, {0x198, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5a3c0}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r16}, {0xc0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r21}}}]}}, {{0x8, 0x1, r22}, {0x1b8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x62aa329a}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}]}}, {{0x8, 0x1, r28}, {0xf8, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r29}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x955f}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r31}}, {0x8}}}]}}, {{0x8, 0x1, r32}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}]}}]}, 0x7fc}, 0x1, 0x0, 0x0, 0x40001}, 0x20000010) 22:18:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4}, 0x10}, 0x70) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$nbd(r1, &(0x7f0000000140)={0x67446698, 0x0, 0x4, 0x2, 0x4, "27dfa9e22e17b78ff2ca35949d009249f3f21f2820cbf22d357c9fda18ac519e4e72cf3f7b279ef6eaa844d992fd5d974e10cb28603313beb49e6413122c96f5f0d1be83da43c97f7166b0f13bec1ec4b8b3e4e6a062e8073cd17628dbb9f8d428215333b90c800fac4366fa0a7e6fec7bf067d218c107e9c23adff92cb73ef5e7a45d0a9b782d"}, 0x97) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x30a, 0x11c, &(0x7f0000000040)="d661e703e38804069d008ba65228741ac045f57f594fc42b0da6bd9ea4c0d4faced666de3dd3ca2c5bfa0198cf0101da05"}, 0x35) 22:18:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = dup3(r0, r0, 0x140000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e683a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r5, 0x7, 0x2}, &(0x7f00000000c0)=0xc) 22:18:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b717000003000000bfa300000000000007030000d73c4574945cad5500fe12007a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000000404d31701007d60b7030000000000006a0a0087a8a8cc00850000000d000000b700000000000000d8ee9d2edd856debc2cd8a461241cd47d44e07017e8ce87f6e432c18af81b83c83cc23"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x418c1, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f00000000c0)="0cc7d930f3ad30", 0x7) connect$x25(r1, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000002c0)) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0x3ff, 0x2) preadv(r1, &(0x7f0000000280)=[{&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f00000001c0)=""/40, 0x28}], 0x3, 0x0) 22:18:36 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x202100, 0x0) write(r0, &(0x7f0000000340), 0x41395527) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000040)={0x0, 0x800, [0x22e, 0xfffb, 0x5e3, 0x7, 0x7], 0x4ca}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001097d60b7030000000000006a0a00fe0000000085f600000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003006300bfa30000000000000703000000feffff7a0af0fff8ffffff79a5f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000800d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffd}, 0x10}, 0x70) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x4, 0x63f5724e7c0d8bb7) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f00000000c0)=""/7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x44c000, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 22:18:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff00010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 22:18:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000002000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xffffffffffffff86, &(0x7f0000000000), &(0x7f00000000c0)="4cea708f9a"}, 0x40) 22:18:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x640181, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:37 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r1, 0x2, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004135) socket$isdn(0x22, 0x3, 0x7) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x1, 0x2) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f00000002c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0xfffffc54, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0xfffffffffffffd14) 22:18:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x24) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x4472f62d27b2ea04, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r4 = socket(0x10, 0x8000000803, 0x0) write(r4, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r6, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x6, 0xfff8, 0x4008, 0xffffffe0, 0xfffffff8, 0x370, 0x80000000, 0x41a4, r6}, &(0x7f00000002c0)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000400)={r7, @in6={{0xa, 0x4e20, 0x7, @mcast2}}}, 0x84) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "736825ba8e3dce6179c9fc4c1427d318"}, 0x11, 0x2) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x1d7, 0x0, &(0x7f00000000c0)="40f088ca1fffffe1000040006f00000000000000e9a3b1b4", 0x0, 0x100, 0x6000000000000000, 0x0, 0xfffffffffffffc6f}, 0x40) pipe(&(0x7f0000000040)) 22:18:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:37 executing program 0: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x4, 0x4040) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e2a, @broadcast}, 0xfffffffffffffd8e) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000300), &(0x7f0000000400)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000500)=0x800, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0x38e) ioprio_set$uid(0x3, r2, 0x80000001) ioctl$SIOCAX25DELUID(r0, 0x89e2, &(0x7f0000000040)={0x3, @null, r2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f00000016c0)=0x0) sched_getaffinity(r5, 0x8, &(0x7f0000001700)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000280), &(0x7f00000002c0)=0x4) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$kcm(r3, &(0x7f0000001680)={&(0x7f0000001780)=@l2={0x1f, 0x8000, {0x5, 0x9, 0x4, 0x81, 0x2}, 0x6, 0x5}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000440)="a3f4c4b65f71ee31eb2d17892e6d28d992eac29ec4bb26df268c59f4e51441135df90127ebdd6856e8b7f725588146958d600bdf034a330625109756282a01ff1fc253add2906077cded4c01573f2c62f060f9e4c65e6a079ef619071a85d6710484ceab3315fe9a33576b417672c5b16a50331c71363312c2ef09776ca2561a3931a21ef12a7d9cbff1ff42fdf00631fb1b9fe906cf1667b037c86b8743b1abecd3fb9a9224", 0xa6}, {&(0x7f0000000380)="1e73dc8f6fe7182648226e2d835d8a330bb7f7756197", 0x16}, {&(0x7f0000001800)="1dac4c77a8a7a6cbe048f94c92f05298d41c3f6f2a85e4570ed0c2f4206d03e3a2b89b7456bcbcda4a210d1981d20e83ce59da0d7fd2e6f5c41652d2f9cafc7a94ca89970d98206297597a1c0593a5f4312c3d27619bba2bb973e166c0275e67270cb6cf2d0aa1fad3a075823514cbee42ad6a5c9cdd30da5a24ba3b4a83aa0a0b3fe52c63b72bb9e418b82faffc7835352cf0ef47aea6909ba480be", 0x9c}], 0x3, &(0x7f00000005c0)=[{0x98, 0x4a845f1eaab489d4, 0x200, "b2e0238712ef874866dd70d2caea430e8eb0c7282aff06bd1eef8fc170a6a1dccc1050a6170a0ae4cd99214801eb0453e2563cd46046797f3ea4d8a43b8f7d14a761ee1fe2ec7c205f916ff70764d99846382c9dc7fcff88aea19edcfeec2a497390a454e570906c58f0c09bf7e9501bfb6a29de028d243de09eb218f87f9703c9f69c3a"}, {0x1010, 0x108, 0x1, "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"}], 0x10a8}, 0x8810) 22:18:37 executing program 5: getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x100000000000017a, 0x0) ioctl$IMSETDEVNAME(r0, 0x80184947, &(0x7f00000001c0)={0x9, 'syz0\x00'}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="84ddc4b702000003000000bfa30000000000000703000000feffff01000000b7060000ffffffff2d6405000000000065040c00010000000404000001007de5305a1957d1180fc8d746690f0c60b703000000d0c57ca90b00ff00000000070015000d0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) time(&(0x7f0000000180)) 22:18:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0xf}}, 0xfffffffffffffde0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x1000204) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0xab2, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000040)}, 0x1) socket$nl_crypto(0x10, 0x3, 0x15) 22:18:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0a79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000011d930c0001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x36, 0x0, &(0x7f00000000c0)="866ec7a4963ba5a3e804e27be943c4975dd892a2881c84ceb8171d7353391b88588265dc8f805900"/54}, 0x40) 22:18:37 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x119002, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0)=0xd0, 0x4) 22:18:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0xbf449896c51bdfb5, 0x70, 0x81, 0x0, 0xd6, 0x80, 0x0, 0x1, 0x10008, 0x12, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000001, 0x3, @perf_config_ext={0x5, 0x6}, 0x100, 0x0, 0x1958, 0x2, 0x54, 0x0, 0x40}, r1, 0x1, r2, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e22, 0xae, @empty}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r4, 0x8001}, 0x8) 22:18:38 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff4e}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000040), 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r5 = socket(0x10, 0x8000000803, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000001c0)=0x5) write(r5, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r6 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r7, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r7, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={r8, 0x30, "e7cc407ed0f2181e9a250ae990ede03a3e7cf5472d7f1884d0157afae82f80be904c2766e6e3f38a63ca5799beb62013"}, &(0x7f0000000180)=0x38) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1000, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100e24f6203c7381600000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x1bf, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x10004, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 0: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000280)="1efb1f8975de790bd575b8f2b3b91e02807c2aac1096ae01e176abc0853d8ec4ca639e321ece49fca1dfd2a229c43d073aa01c18748f2add921a94bda21f1d9bc3898ecab30cdcf58d6e2539364a2bc0697420cc88e7b8493092e944d8e57a840b9af1d82bcc6b369d5968db851f686efd1b3112a9ddb8e9347d2e8cac5468a4", 0x80, 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)="45d4054c79b120d543c463189b4a6d0bc93b6db7fa9ffec4d742721d520f7a", 0x1f, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000480)={r0, r1, r2}, &(0x7f00000004c0)=""/54, 0x36, &(0x7f0000000540)={&(0x7f0000000500)={'sha3-384-ce\x00'}}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x220041, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa3000000007a0af0fff8ffffff79a4b7060000ffffffff2d6405000c00000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/102], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x41395527) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 595.415441][T20555] could not allocate digest TFM handle sha3-384-ce [ 595.471516][T20560] could not allocate digest TFM handle sha3-384-ce 22:18:38 executing program 4: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x66, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x55, 0xfffffffffffffde1, &(0x7f00000004c0)="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"}, 0x3d) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xa1, 0xcc, &(0x7f0000000140)="bddc98a5fd51565cc2d612604eddc6de09bd4cd20f6bf9f0e9628bb42a1316fb1d924dd77e95b030d885186550e93c10bf1a9d219ee2bce375ebe6ebf1dd7aa85e14f3b665d74da71e0db4f58a51de0de75009fef68813b827019f8162700ed3b2a0817d01fece806b949435e988d271c6ffa7ead39ec4d639aba419e9cbbddbbebdaf59375b7426a598b3026dc6d0e6770daf239dd6d2315d4040a5f58db27025", &(0x7f0000000200)=""/204, 0x1, 0x0, 0xd1, 0x92, &(0x7f0000000300)="9b6d8a465ed28d03093db5b10be6cb362aae20985f357084fd435f0130deab632b7652d40a1112f8dd97b732ea84b13271ac5491b97263485182a4a299bf77c71eaf682de8fed26d7f4301305127d73eaeb68a110e8cc813fcbf34ef1783b2d4f52f351319f64916b0704597e1dcbddcc9c3f4dc40e01868e07577b6fe0cce518b659649cfeed757f4045843fe74b12c938da732eabc3d30b2e002f7d93aabe7c9cd111042b882611ebbfd3ce7dc0ecec2f6c2650c9dceb2255034d62f891da240947c26e9ed449574109d17f2d2a4bb01", &(0x7f0000000400)="dd98ab92e7a598974744ef055fcb1cd8cfd61ce2c88948501f0e87ac21b989fa331c2b458d8f538738336fdda6e0354fac81826dab46e90373d6429303160c662a86b4b6b85c7d113b761da189d4df53aa5cf2b17620c21a01e805c00a399d3a8951a303fbb7d8e8c403818a14267e8f8ac4ba55d51ebd7242f96433165e605bed39ccb50bcaef9d7bd385f58e214b0ad899"}, 0x40) 22:18:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e448489af3aa29508e1cc97dc68b1b8d571d3ce0a2784860ca65b19ac31ac15960836e628a4f5ef01d107f18eb03016600177dd53249910139a7431ac450925caac3bbbc17fa896521dc72b64ba144e947243595affd056a9c172e359d84afc23fcb1306870fc64923560a0b45d06786bf2be8f0d83015ae5250b0d98e053b8c7e08c0a285cb6c15aba7e377829dd38425c202dc8d54ecc4dd6c3b0a42bae19bb15925e738018e006f17c1bebea9fa55e5edc496731c285d90f0db4c901b243b44276f571fbf8a79a94f06206713ad18"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff00000000b70600005bea05e3f102bcaf0000000065040400010000000404000001007d60b7030000000000006a0600fe00000000850000000d000000b700ff0100000000000000000000000000000000000000008b054da25d84"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 22:18:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x30) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10000, 0x0) pread64(r1, &(0x7f0000000280)=""/117, 0x75, 0x8) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000140)={0x0, 0x80, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:39 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000140)={0x1, 0x3, 0x1000, 0xe2, &(0x7f0000000480)="56fdbc10c328c40ec7b55cd0fd730f8a57be2b56921714a9eb88df6e5d9d7a4f76911779d9d31c16c5a60e62c89550faf9cc896bf56964882105a717610d76b17d66fa6fa7446cb3f6019a9d684d729e34eadf9d67151815fbedefb3bc1f1cc7470e0c97acfd40130109cc382715fd9fecb6e795fd929dc50e8c99e3f4b25208bbdf2b1dcd8ecbde0688d0b3d508823d7c59c01370919cc26cfb918314a4708392a591ee5d54d527b6bcc5a87fb26334560e673efa30cf57ae1b78bc10f42f0844a9d155127d87761d33d705f700dce7205deb60d476f4a5404a1e88db7bce225b35", 0xf8, 0x0, &(0x7f0000000580)="6b8f71150a84d26cd296104a15b3b168bf3bca1e580cd0c0f504657c69f790d64c517092ec8ff01977d87d5edad69a210392935a0272e72bfb058291a1d1a3484a8202fd192d8f58f92dd19c3b49b640dc7316a34c7ff16ff311c9ea63303a2f1fc0333f047e3836518d32cea770d2d9f404d8a35a7ba62ebb9ee7393388859d3199a19759e33fecec7c6f385a01c7dcc8906ef03561065cd23a9b776c07dc7242fa2a328d9ea0da282da2c1617f0e6cc33de715e78f4955ac715b7c10d33a58061b86cb712c0fe4a434ef80d6e6f431899cbc9a1cdd8ec98c209eec19bbe11ef052ba553a405cb87889c51f2a092587bd61500352f7fbd9"}) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0x0, 0x7, 0x9}, 0xa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 22:18:39 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xd83a, 0x20000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000540)={0x0, 0x0, 0x2080}) bind$vsock_dgram(r1, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) write$FUSE_OPEN(r4, &(0x7f0000000140)={0x20, 0x0, 0x2, {0x0, 0xc}}, 0x20) write$nbd(r3, &(0x7f0000000400)={0x67446698, 0x60000, 0x4, 0x4, 0x2, "e423d80813815cad8d4d11ef56123bca097771afcead98ce76d3c7c949d974f03896b2cb287a24e5ea12a9aaadc4904a6b71216936d735b4299a33540e2610c0ddfb1712dbfd03257cc79413941bce6a5eaae1eb0fc1c5f51513f0a0a79c81684bd4e478b6b64f484e20f1598663f144fff02a414a6113b3fe08526dfb6f117b11c2263e6b4e46b8ff0a08b7c15d9f2b715ed513baa18010dc1f0bf3429c38f79d3657081442ba0ec4db8f2ef3bd1ba6bf6ff70fac77042ce38ff852c16be487a4a1248812a2c5da4fcdbaa936b94743f91603886d80ac0aeda56f10f5dd2a93564656670b031f19ba432f315015f5bfbb44dfd9cd86c126e2"}, 0x109) 22:18:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefff47a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001ae393a94daad6055297168805e544f47ed71d63dad10a2d7db30e2d5c6a11f4d6d0fe67d2413e331434cea75a7ea95beb725bbd1fe6dc56d3a990d0890679367a9208f1d445"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x32a}, 0x28) 22:18:39 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], &(0x7f0000000340)='\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xffffffff}, 0x10}, 0x70) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x200) r2 = inotify_init() r3 = inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x40000000) inotify_rm_watch(r2, r3) inotify_rm_watch(r1, r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f00000003c0)={0x4, 0x7}) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4e2404003f0000", @ANYRES16=r8, @ANYBLOB="03040000000000000000010000000800040001000000080002000a000000"], 0x24}}, 0x0) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, r8, 0x400, 0x7, 0x25dfdbfb, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r10}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x240148c0}, 0x400b000) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r6, 0x0, 0x488, &(0x7f0000000280)={{0x89, @remote, 0x4e03, 0x1, 'wrr\x00', 0x2, 0x1, 0x44}, {@multicast1, 0x4e21, 0x10000, 0x6845, 0x6, 0x6}}, 0x44) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r11, &(0x7f0000000300)={0x0, 0x6caf29ac598e8e76, &(0x7f0000000000)={&(0x7f0000000080)={0x38d, r12, 0x403}, 0xffffffffffffff81}, 0x1, 0x0, 0x0, 0x40000}, 0x20000080) sendmsg$FOU_CMD_GET(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r12, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x4867c8261eb9be41}, 0x80) 22:18:39 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x200000000000006f) 22:18:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x40) getsockopt$rose(r0, 0x104, 0x6, &(0x7f00000000c0), &(0x7f0000000140)=0x4) [ 596.743506][T20605] IPVS: set_ctl: invalid protocol: 137 172.20.20.187:19971 22:18:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x5, 0x24000) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="742fbfc786f357c40000000000000000", @ANYRES16=r3, @ANYBLOB="00002bbd7000fcdbdf25100000005800010014000300ac1414bb0000000000000000000000000c0007000800000020000000080002000c00000008000800010000800800080005000000080002000400000014000300ffffffff0000000000000000000000000800040000000000"], 0x74}, 0x1, 0x0, 0x0, 0x40080}, 0x2000d0cc) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc000802}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xf4, r3, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x11, 0x1}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x5}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x4}}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xf4}}, 0x4000) 22:18:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x682140, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0), r3, 0x0, 0x2, 0x4}}, 0x20) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x18d800, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f0000000280)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r3, r4}}, 0x18) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 22:18:40 executing program 1: 22:18:40 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$ax25(r0, &(0x7f0000000140)={{0x3, @bcast, 0x6}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null]}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:40 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400000100fd60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000100)={0x0, 0xff00000000000000, &(0x7f0000000000)={&(0x7f0000000080)={0x24, r5, 0x403, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}}, 0x0) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x30, r5, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3c}]}, 0x30}, 0x1, 0x0, 0x0, 0x81}, 0x40000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) getsockopt$inet_sctp6_SCTP_INITMSG(r6, 0x84, 0x2, &(0x7f0000000140), &(0x7f00000001c0)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x7}, 0x8) sendto$packet(r1, &(0x7f0000000400)="19c860829e736126d5c0fcc595e5253f69ba2d30161c803da960920525d4850d58f592d93183b38792c86a2ec6fc93e87c7d9e2d8333c435c41bf95817d154c2911d81ded82795560735798897f8d264874dab80d347c06e0d67adc00c646b20b12e5f69962aab643aedd7c0e8598fd9f110680eb71aa29332786618fbd4638f544b5387475de6844ec2cb03514b12175c6655b0edaa149bb385519566ae4733e47b96025344fd1fc2d6f784e0a5102b05766b93d9077d06d8a5d9ff5a0bce6d33e0b8744d51e28b1f37e02cb40f10fac0c40fcf02dac47d9f8fe80dd1886459744e821d9d3021c38d38869306758693", 0xf0, 0xc000, &(0x7f0000000040)={0x11, 0xc, r7, 0x1, 0x40}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:40 executing program 5: clone3(&(0x7f0000000300)={0x2000, &(0x7f0000000040), &(0x7f00000000c0)=0x0, &(0x7f0000000140), 0x27, 0x0, &(0x7f0000000180)=""/94, 0x5e, &(0x7f0000000280)=""/124}, 0x40) ptrace$pokeuser(0x6, r0, 0x9, 0x3d) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:40 executing program 1: 22:18:40 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30400000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xbc0121aab9cfd5a1, 0x0) ioctl$TIOCEXCL(r1, 0x540c) [ 597.657307][T20640] netlink: 'syz-executor.2': attribute type 4 has an invalid length. [ 597.689741][T20640] netlink: 'syz-executor.2': attribute type 2 has an invalid length. 22:18:40 executing program 1: add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) creat(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) delete_module(0x0, 0x0) 22:18:40 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x200000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x1fffffffffffff19, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000040)={0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000400)='./file0\x00', 0x800, 0x5, &(0x7f0000000880)=[{&(0x7f0000000480)="773e961f305e2a13729c2f72743030477f2d2bf55cb325da2d6c3678f87ea2c951ab802aac3fba92f7f2a05b938c3e61c6bde6d8cb10d650ccc62d43c77305d1d966d65693706272e97f86c9409cdcc97f4118c231efca198c8bc43ae2182bf96ba185745e6c0932db34f3bd051a05174ce44dc0d572f429cf9c9ec093de3687fcaa03f6e9c39439d0b3dcbcd1a1e30b550d09b512ff183d23469e9acf542f6d2f6a287ec8538da73ce851d15285239056d549559506410f70d87ef972c7d60fd9c5e2304a5db483923b42ce4ef6fd9f07944c93192a21cfd430ffeaf7b5e1ab35e37a2855ae2519e6973efe22772041fa923d86d48c", 0xf6, 0x40}, {&(0x7f0000000580)="8265ea82c9b3530ec0973cac35277220c4976c2346bd0ff2ecd7c93ed6d321033edfb3aef8b674df44e6e7d474cb3f7508cdfeba82356b23f2064aabbef2328e7d97b7c79f01da233b2c4c0c24ca3808b2ebdf31be6e0d6c25f9eaea6d930346ace2d8f953407855b005a82559a516dc4fa9b85f55dd473710b05c5bdcc0c7818c7d1889b71f8e0c716f421f6d78f2", 0x8f}, {&(0x7f0000000640)="890f0cdc75c167f93da70b001df9aa70cf4cb2162765fb13d3863e9750577cceb19674c67315cef873f11916e895fdd9c6ee2de30d521b7d630603d70814668de4c6da57cbddb79fe92f76167e76b3c62a33e5922e4f3ce2705c786995d47a1796d48c2f1a4d5c3fe63e3546032712d0cecf7bffe22023ae8e0651fb7bc3e4f0c13ccd2aec4dbd29585171446cdab0fe689de620c8b7a7d276c60039f7bb9e62c64cf642c026b07a1e929ee56e5007ba1abeb7e8d8719390d5f154e28d17471776474ae59e2ae645512e80", 0xcb, 0x5}, {&(0x7f0000000740)="dfc2285c5f9ec44ac5da0dcd56076653831c3b211ed748df2dfa29e30b9497d9", 0x20, 0x2}, {&(0x7f0000000780)="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", 0xfe, 0x80000001}], 0x28, &(0x7f0000000900)={[{@delalloc='delalloc'}, {@bh='bh'}], [{@measure='measure'}]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={r5, 0x6e}, &(0x7f00000000c0)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 597.965346][T20654] bridge1: port 1(syz_tun) entered blocking state [ 597.984358][T20654] bridge1: port 1(syz_tun) entered disabled state [ 598.004392][T20654] device syz_tun entered promiscuous mode 22:18:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x412282) write$P9_RMKDIR(r1, &(0x7f00000000c0)={0x14, 0x49, 0x1, {0x20, 0x2}}, 0x14) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xffffffffffffffa5, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 598.021274][T20654] device syz_tun left promiscuous mode [ 598.045644][T20654] bridge1: port 1(syz_tun) entered disabled state 22:18:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000500)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000540)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4c, r3}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x1, 0x7, 0x1, 0x8}, {0x7, 0x99, 0x0, 0xd384}]}) 22:18:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000180)={'lo\x00', @local}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESDEC=r0]], &(0x7f0000000340)='syzkaller\x00', 0x80000001, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:41 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0x3, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000007e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@hopopts_2292={{0x18, 0x29, 0x4}}], 0x18}}], 0x1, 0x0) 22:18:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$amidi(0xfffffffffffffffd, 0x2, 0x80) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x5, 0x7e, 0x1, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000780)) ioprio_set$uid(0x3, r3, 0x80000001) r5 = getegid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x101046, &(0x7f0000000600)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x3600}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x2}}, {@allow_other='allow_other'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '-&\x18selinuxmime_type)'}}, {@obj_type={'obj_type', 0x3d, '^vboxnet1'}}, {@dont_measure='dont_measure'}]}}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000040)={0x4, 0x32315258, 0x4dda, 0x7, 0x2, @stepwise={{0xe2c9}, {0x2, 0x6}, {0x200, 0x1}}}) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0)='bcsf0\x00', 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:41 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x10100, 0x10) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f00000002c0)={0x4}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180)={0xaf06}, 0xc) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000480)={0x0, 0x7a, "9a8d07b7e69313c0e043c4a7db054c34ca9c71d7e85ddea8da2df499cbd5b88420414e780f4b3a6857b2b0b78de2557acf4c6dce1d82a8dd5459854bf25d0a37cec27b11be478fa8c7b9bfd4b79a72a05eae575290e7b034a0c2faef0e7f471f0c3d435ccb1ac13d3900218668500db598b2fd814852613a649f"}, &(0x7f0000000540)=0x82) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000580)=ANY=[@ANYRES32=r4, @ANYBLOB="9b0000001542d5e29ca5d5b440399f26005345cd66f6b51943b06b0f210d50e658d4c3e74dd685385dc7bae4eb04766fe7f309388c18741d56c43e287566935a6da005b233a9e81ecb2637ea04bed2f083586ed96064082fa7daf9c8f3606d841502267dd4e752fbbaffee693c5566c9ab6817a0a673133d2854890c38bfb713042b5ddcf9dd294fee0857208a8000bbf01087a232319801eae44e786fb935"], &(0x7f0000000640)=0xa3) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0)=0x4, 0xfffffffffffffd3d) openat$mixer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mixer\x00', 0x1000, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a00b7060000ffffffff2d6405000000000065040400010000000444000001047d60b70300000000006a0a00fe00000000850000000d0000b7cf00"/111], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$MON_IOCX_MFETCH(r2, 0xc0109207, &(0x7f00000006c0)={&(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x6df}) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000140)='syzkaller\x00', 0x7, 0x3) getpid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x37, &(0x7f0000000000), &(0x7f0000000300)="260617dee0f6fd7041af8eb5899067ddd70957b0c57298115d95c99aa4b40062687192032a1f0b4fabb0ffc3f5e8fa7cf73750d2f2e9bd"}, 0x40) 22:18:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00000000000000) 22:18:41 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="9345e4dc6141ea32f94a"], &(0x7f0000000140)=0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000040)="b9010eca1fffff20000040006333624a15b6c1622177fbac14140fd4692add0000003997f1a4f6159815a35520e56d1847fb5880fcf4db", 0x0, 0x100, 0x6000000000000000, 0xffffff80}, 0x28) 22:18:41 executing program 3: restart_syscall() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) 22:18:42 executing program 1: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = syz_open_procfs(0x0, &(0x7f0000000100)='sessionid\x00') sendfile(r1, r2, 0x0, 0x1) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) 22:18:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='oyzkalher\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000040)={'bridge_slave_0\x00', 0xb1e}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xb, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x5, 0x4, 0x9, 0x2}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80000, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000180)='security.selinux\x00', &(0x7f00000001c0)='/usr/lib/telepathy/mission-control-5\x00', 0x25, 0x506a4170c135a995) 22:18:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a8af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000090594c18bf7c010fdc15000000006a0a00fe00000000850000000d000000b700000000000000950000000000000089bcec4c166e1f88f177bd6cc0f810da893686544ccadac80da436958d9fa7c21d9df4d648b281628038765e82df85ad8a00000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:42 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f00000004c0)={{0x9, 0x95}, {0x1, 0x7}, 0xee92, 0x1, 0x9}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0x1a, 0xa8, &(0x7f0000000040)="662b62c11343914af5eaedc5a8008dafa88e8da156d1c7e438cb", &(0x7f0000000140)=""/168, 0x9, 0x0, 0xb5, 0x8f, &(0x7f0000000280)="457b837154c622a1f2b245e663e35aa02415908b3d1502da4963e773cbb571a0d45ced9823926fb13bb32deaad195abf7857450ff183864542f73e4d80cfc8da86e36a4503cec11141019bfc22e985cc67059c2e390208fac4d2a03ea307b4b39067bc953fa35c529038c438ed5571dcfb38456882409aedd69f843b0738ef036754bdc40582dabd780f897f29e5e3087d24d73bdd606e8f4fbd25dc8a51f983c0143aebc7c6f645325a4b841abdccc36bcc1744b3", &(0x7f0000000400)="7c8f8903f3ebf45001de19c8bbc89c7da748ed859a151c61e6464b33d0b84010f84126c276ca115a5344e947b15ef10477d783ffd10c4cc2b3b836646b03601da3bab61d5b1254565e238fa94541a9c69cfbe1a9ca0afe0200d5eba84b792b46dc2dd7a4872c9d06bd9ca7192e966a2456edf2a54b46997965489619502c801aab2cf7a4eaca5afbe0a9ce702512dc"}, 0x40) 22:18:42 executing program 1: 22:18:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x4c, 0x0, &(0x7f0000000140)="b9150eed4ab09b8fbfdffff0f3ff019e40f088ca1fe2ffe100004000633377fbb714140fe9a33fa111c9f185af87aab71c0d0e7974c5b6d6fb9e52792c5ba5db7637f6248b579f5cb1761b9d", 0x0, 0x100, 0x6000000000000000, 0xde, 0x0, &(0x7f0000000400)="2ac6aa9b780ea2b09ca33d159c9c84bfd30af75f082f5fcd44b6165bc9a9ebe51265315395cded56b885523f0baf2ea3b6177ef7ee1878c2a5cbff456543e8fa238098b2d6b69f21deea05da80beac504250e68e114e9e4c85dbf7ba2e962efd0f147146b8a7e9e58ee257c59dc908b333f084703524b88a97f231a64bcdf57d4ab532680c186bfe893432ed6bd9e36a57341350224e17f4637b08243bd6d78d6696e34d64b74776d1e11f72d9facffea2d285fe697ec87ba2eea93772b2e900e275eefc5bdaa20ece478c4acccc5f654acb0b5865ef9ca54290a4e10300"}, 0x40) 22:18:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70261cbd44ffdaaaad7000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:42 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r3, 0x80000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r4, 0x80000001) setresuid(r2, r3, r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:42 executing program 1: 22:18:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003080000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffffffffff01, 0x80) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000280)) truncate(&(0x7f00000001c0)='./file0\x00', 0x1f) write$FUSE_WRITE(r1, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x8, {0x400}}, 0x18) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7fff, 0x100) mq_getsetattr(r2, &(0x7f0000000180)={0x1, 0x1, 0x1, 0x1f, 0x8, 0x4, 0x10000, 0x9}, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) 22:18:42 executing program 4: r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1, 0x100) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0xd, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa300000000000007030000d004000000000000f8ffffff79a4f0ff00000000fffffeff2d6405000000000065040400010000000404e5ff00007d60b7030000000000006a0a00fe00000000850000008d010000b7000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x145000) write$P9_RCREATE(r2, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x20, 0x2, 0x7}, 0x4af}}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$pptp(0x18, 0x1, 0x2) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r2) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000001c0)={0x1}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x3bb674ee, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x4, 0x4}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x1, 0xffffffff, 0x5}, &(0x7f0000000200)=0x362, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x7fffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000003c0)=r3, 0x4) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x8, &(0x7f0000000380)=ANY=[@ANYRESHEX=r1, @ANYRESOCT, @ANYRES16, @ANYRESHEX=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0xffb6, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 1: 22:18:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) nanosleep(&(0x7f00000000c0), &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000180)=0x3d1, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x3f789f6c89cf90db) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f00000000c0)={0xb6, @multicast2, 0x4e22, 0x0, 'wlc\x00', 0x29, 0xd0, 0x80}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_setup(0xfffffbff, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x80) io_setup(0x37, &(0x7f0000000400)=0x0) io_cancel(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x6, 0x1, r2, &(0x7f00000001c0), 0x0, 0x5, 0x0, 0x1, r3}, &(0x7f0000000300)) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000040)=0x68) 22:18:43 executing program 4: r0 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) setgid(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2000000000000230, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 1: 22:18:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc76, 0x0, &(0x7f0000e68000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000040)=ANY=[@ANYRES64=r0], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x2560ac43086cee89, 0x0, 0x0, 0x284d18a7e80ab750, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b791000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 1: 22:18:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x80, 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0xfffffc28, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) vmsplice(r1, &(0x7f0000000600)=[{&(0x7f0000000400)="99482e27689127a53e695ead39da6440b0ce4f3c810ecb43e17d799e0c2b8892294cdd55b33159a87a6d4201598ed8fcb0026efa8f0eb755560730b27f6c9eef489bf0546b56130fd967e58b093e50dc4b20b724e21abf1e8ea5ad42742ade36bc48fa99332e95faa88bb527c81104ce50139fd203042585607be1b361aeb1cb0f480d627c45b9c1b0ba864d5db6765eaae125097b00eadf6fa6f8985181b0dfbf4dec64f7d6cb6ce120b5611e485d535f215a4fbd76881946de71d1dd3f63abbdbba6a94d49f8f9097b4cdbb6752c6991e99f6975abac11d306e505ee5d85d28059d43779b368fecad4d1b249a44118b17e", 0xf2}, {&(0x7f00000001c0)="3bb6b11ad16f520e3a8d7910df207c67a2fd400876985553c9ede4cb8b7eb462845c50c9b6996985804223", 0x2b}, {&(0x7f0000000500)="2ddc520315b3701534e3cd6c9da65e0dcf166ff7d6de05e5d0c68577e5dd1c699a68b0906c0a489ccf288bfbbd138377def20ad89ec0862f6d69d5e99fe345847c247df7c389932d2f9c3a84df4a24c4c3f67e9da28b256fc9cf598464dba94ede3e6dceb072dfb95f35962af5110c00e044fb0ec8eba0175bb656f0aebec7506bb1566754790bf8b70a7742bab01bd12d0fa2387bc2a986dadf1cff78c024336ea0e949eaadd5c85656636eb4684d8f2c301eda22dace9d36f8204efcfa40a59b3b0764d7917de1777d5a6bcfe3926d0b61fe827e0a6ea652eed4e0613b6a479813465a6bc2c45099323d5015d30b03", 0xf0}, {&(0x7f0000000280)="dc43736b7cab720cd74aa779d8aef67b9bdc6c3da74e2a1f1567962a9f60e7110a6aa1f3739fae9d547cae99f2464f797dda017be3164a8a7e1725695a579f00f04d3fcb4765b1d27d950641abdf7019af17071e346848cd16996d3382058bf0c1d84103313a5b24ccae2b277977f54f26170fce26c857a855346649a4deedf5c224b7a39139cbd386729002606b37570ae830d02c209a07323ccf76ec32867075f5fa274e6ce1e9aefe02abb4055ba59de00678d04fece3eb", 0xb9}], 0x4, 0x9cd99037ab318794) 22:18:43 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000040)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x4e, 0x0, &(0x7f0000000140)="cb4f4eb92fdd1b656501713165ee8e248d9f816b3a5fe3adcfbee226aecdfab6ff83fa65981541dda2c8f794964071be4ed945183add780c1d596613b3a4e2e1ec1b6e7124b8ff22e192c181b635"}, 0x40) 22:18:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2a401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 22:18:43 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x4c2dc5946912462f, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 2: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x3ff, 0x2000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'trusted.', 'syzkaller\x00'}) write(r1, &(0x7f0000000340), 0x41395527) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in6, @in=@remote}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0xe8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000180)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d600000850000000d000000b70000000000000095000000000000008f4758752054e84b9819223694ca3dfea825fd21fdb1"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:43 executing program 1: 22:18:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000d00)={'vxcan1\x00', r2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], r3, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x0, 0x1, 0x0, 0xfffffffc}, 0x10}, 0x70) madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) r6 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_STAT(r6, 0xd, &(0x7f0000000700)=""/197) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) vmsplice(r5, &(0x7f00000000c0)=[{&(0x7f0000000400)="3a88231603b0b1b33512589ca9748dd1e0335ca0137013c538f28baf82f7c13aff00e8cc9ee3079a5c9627663798cbd83b9260dcc01b5aacbb269d207ea989293221f16a854d571cd6da99efde8b11160dac5cbef6e3dde7bc8ff318cde2a1587beffe6a6cd12b4efa5c823eb8274b4f2e452b4566dfb1ca758fd7d649adc67d66d204c14c97a1d7422b9c6f91e1b11b14f9e456846db1b4ca448d6501f76e3fa371334775cf51ebced3f47ed731a4f787302f4a16c6d93f20452ea92f9c23c7efc70414c5bfafb4892aaabe8dc077f39d08904572972c6dbaf6d63bfddccbcfdd1b17d060e0fd639d4c1d2bc03637fd79ad", 0xf2}, {&(0x7f0000000040)="9b7d7239cca2e63add560da90419dd28", 0x10}, {&(0x7f0000000500)="bc6d7c08f91f09bdab32e11bbbaf78c4fe943e3ce54b8dd6fe91b9d09c67c91e7984d1d35163a8ae5387545ddcb0a9de88516ad532c62df88dda8ec6c93c2789001578a3856df8f0b100d26554e0a07f0f05d43234229b025a0f6fa1033da965124eacba47a3c399ebe97c6ab93dbc349031368719404bc883b3fbe82aae335b602747492fd456a846a585b6a1cc41c578e9a103375daec6ce1b82224c5c9bf618114f8afb61ba1decce4126ec670c76ee2e59627beedfef217f9a1113e2d0e56498d5cbfe3937120f7422bcd52bf0ef15", 0xd1}, {&(0x7f0000000600)="ed7c327d47dcf21f401fd1e25a3c09747d62c615ededcc69adb04a2f929ecd9663567f2ca3965099417abea21d53c57c846a0fa93212eaa719d405de73321b9501171c1fe5db53c3dbb35acf3c47562abf457f5a6215395631c42b094616b39634ac046d936b9de2678636a0e438686f9f6e6094ad7acc0bdb07c0d52065b65a26905f3379d517d6160593d59167a17da7c1f47b36b7b083111603e1589dfe2eb209dec299d3b61b4ec1d719cab7976d1fe519875ae390bb03855aee81fd47c6f3b8fd88ca380f0a04f9e9189f12d97f8e48", 0xd2}], 0x4, 0xd) 22:18:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4000, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 22:18:44 executing program 1: 22:18:44 executing program 5: 22:18:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x40000, 0x10) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000000140)={0x40000, 0x100, 0x7}) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8feffff79a4f0ff00f2ffffb6060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d001000b7000000000000009500000000150000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0xffffffc2) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) io_uring_setup(0x939, &(0x7f0000000140)={0x0, 0x0, 0x6, 0x2, 0x169}) add_key$keyring(&(0x7f00000000c0)='keyrxng\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$setperm(0x5, r1, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:44 executing program 1: 22:18:44 executing program 5: 22:18:44 executing program 1: 22:18:44 executing program 5: 22:18:44 executing program 2: 22:18:44 executing program 5: 22:18:45 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000100)=0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0x10, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa3000000f0fff8ffffff790400ff00000000b706000000ffffff2d6405000000000065040400010000000404d573c5c79afc3f00009fa34a734cfcbe728a01007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500"/128], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 22:18:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000040)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x300, 0x6000000000000000}, 0x40) 22:18:45 executing program 1: 22:18:45 executing program 5: 22:18:45 executing program 2: 22:18:45 executing program 1: 22:18:45 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mlockall(0x1) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x200000000000006f) 22:18:45 executing program 4: sysfs$1(0x1, &(0x7f00000005c0)='syzkaller\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a22fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x11c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000140)=@sco={0x1f, {0x4, 0x78, 0x0, 0x85, 0xfd, 0x9}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000280)="44d3cd1b684adb56449f4dbdc8806ee134eb21b103e93bdd70962189e38b57a4eeb309a9efd8671f56bfc2348ae38d7018dbc50df0a38c6126e1b19c7dcdfd11492ff6b1125d07520f50e4db34c54b33fd05d3fbfc8ccaa4eb", 0x59}, {&(0x7f0000000040)="ab289f57c31362e2a6c8930eb947ca78997ebb30055f3b0cf5690e1960b870831b494a6a6b0c4855", 0x28}, {&(0x7f0000000400)="800412f48ae45253a34c697f33c3bd967e70e894e947e6629a4f9b998ddb48dbfddf2298f825cdcd8d254e47e618f95a5caee914b70b6a55e75cc77149f143fa6c27a4da247bc6d827c0089f28", 0x4d}, {&(0x7f00000000c0)="39a90f4dc1e8f15b24d86c890d76fba4bb8027392d198099a1cde8853eb726b86a266b", 0x23}], 0x4, &(0x7f0000000480)=[{0xe8, 0x111, 0xffffffff, "8b62fa50ea95a24628600d6f7cbc5f929ad34fc079bc4d0a0965cd6603ffe2e59d8cdcb9d1a2693fdcd89e81ff175b7d8c34808007ec58bb57e7427ddb79d06473bbd8a9b85712a54c9a5b4a90ac84adfce0a2afd79116e51b96cda2c5658be6da2c2000fbe270604003d6e6ffb7a080e5582e4544ab94414d90a240ccb43098ee7d1a6806a6bfa8479396d859969282bba23f1e4ec5d1ec08dc284101b049e1b58f1d27edb107bca3863de4d125dfb95f459d456c698afa44e52beb58dd021d62bdc5da3fde0fdbe368719ecdc55fe42652eec86bed5561"}], 0xe8}, 0x800) ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000580)) 22:18:45 executing program 3: fsopen(&(0x7f0000000280)='binfmt_misc\x00', 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x40, 0x0) connect$ax25(r1, &(0x7f0000000480)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@bcast, @default, @null, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) ioctl$HCIINQUIRY(r2, 0x800448f0, &(0x7f0000000040)={r4, 0x7ff, 0x6, 0x0, 0x2d, 0x3, 0xe9}) socket$rxrpc(0x21, 0x2, 0xa) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x2c, 0x0, &(0x7f00000001c0)="bb6817969ce1473b9b2f0c019dc3327edd98e1b537c19daee1af1de0db0a8014d6ac9a79302778cfdabba144"}, 0x40) 22:18:45 executing program 2: 22:18:45 executing program 1: 22:18:46 executing program 2: 22:18:46 executing program 1: 22:18:46 executing program 0: getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f0000000180)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000280)={0x6fc876c6, 0x17, 0x4, 0x4, {0x77359400}, {0x4, 0x29a66d90d5eff531, 0x3, 0x54, 0x4, 0x7f, "8ae24eab"}, 0x4, 0x1, @fd=r3, 0x4}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x40, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x1, 0x2) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ubi_ctrl\x00', 0x30000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000740)={0x0, 0x0, 0x38}, &(0x7f0000000780)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(r7, 0x127e, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000008c0)={r8, 0x8, 0x30}, &(0x7f0000000900)=0xc) ioctl$DRM_IOCTL_RES_CTX(r7, 0xc0106426, &(0x7f0000000200)={0x6, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000300)={r9, &(0x7f0000000480)=""/112}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r6, 0xc010641d, &(0x7f0000000680)={r9, &(0x7f0000000900)=""/162}) ioctl$DRM_IOCTL_NEW_CTX(r5, 0x40086425, &(0x7f0000000400)={r9, 0x3}) r10 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x80000000, 0x80000) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f0000000240)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r10, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r11 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x200042, 0x0) write$binfmt_script(r11, &(0x7f0000000500)=ANY=[@ANYBLOB="2321202e2f6669a96250a8430244ca1a77d66c65302047504c26277373202c5d6c6f0a6fe11e680effd35c3c0f0a43a72b0cce4abab182c9b80cb9bca97f599186ecdda91b2a742709c500000000000000000700000000000000"], 0x4f) ioctl$KDMKTONE(r3, 0x4b30, 0xb7f5000000) 22:18:46 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) mlockall(0x1) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x200000000000006f) 22:18:46 executing program 1: [ 603.236498][T20916] Unknown ioctl 1074291749 22:18:46 executing program 3: 22:18:46 executing program 2: 22:18:46 executing program 1: 22:18:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:46 executing program 5: 22:18:46 executing program 2: 22:18:46 executing program 1: 22:18:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:46 executing program 3: 22:18:47 executing program 5: 22:18:47 executing program 2: 22:18:47 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='stat\x00') ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000140)={{0xb, 0x20}, 'port1\x00', 0xc0, 0x20000, 0x9, 0xfffffffa, 0x8000, 0xffffffff, 0x5, 0x0, 0x2, 0x5}) 22:18:47 executing program 1: 22:18:47 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="b7020000ad191c4e58b9ce207cfec7ec3b03000000bfa30000000000000703000000d854f2580af000b7060000ffffffff2d6405000000000065072d759501650f1b9eee040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000065000000a97698751214fe000000000600000000000000c65bdd7d44768a66b1a70676f0fd8965a010920f5cacad2662617d7be16eeaae2864e898cffc81749a7f0000009a2cf1bb438dba749673dc4ca21f80f5ab6ca5f9ee0cb08dfc2379122f8145e1881523937834a8ea1ae98f2527aba200"/237], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x70) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e23, 0x195b, @loopback, 0x9}], 0x2c) io_uring_register$IORING_UNREGISTER_BUFFERS(0xffffffffffffffff, 0x1, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:47 executing program 3: 22:18:47 executing program 5: 22:18:47 executing program 2: 22:18:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$nl_crypto(0x10, 0x3, 0x15) 22:18:47 executing program 1: 22:18:47 executing program 3: 22:18:47 executing program 5: 22:18:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) readahead(r0, 0x5, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="404c6d030dcf38967f41e5f9ada332302ca4697fcbe773e25cbe00351129ff171dfcde9d46b7d875825d8eab3f0dba515e9e41731a2de3dac11c48311f0976b9ae73ef97361dc1ea74ecfede930338889a7873ffaeb47d05bc8ac625d0beb2c711b321f5d48de5c3c564c01a5e62063e0f30e03b9fde3562ba3f3c303b6ec4608a9ae45d58ee536ca7bb4f19d8b6d1d1dd72996bab8a6bdd29d29511d036e0e0663d48b205df39671a4b58c3d38c367749f8e1cd0bbf6c391aa612111f99a637f1693bb7138bc63583bd30d0f9a6e0ac"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000000)={0x0, 0x80000}}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f00000000c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) rmdir(&(0x7f0000000040)='./file0\x00') 22:18:47 executing program 2: 22:18:47 executing program 3: 22:18:47 executing program 1: 22:18:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 22:18:47 executing program 2: 22:18:47 executing program 5: 22:18:48 executing program 3: 22:18:48 executing program 2: 22:18:48 executing program 5: 22:18:48 executing program 3: 22:18:48 executing program 1: dup(0xffffffffffffffff) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x18) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x7, 0x0, 0xca}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 22:18:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:48 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$inet(0x2, 0x1, 0x1) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000780), &(0x7f00000007c0)=0x4) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$sock(r2, &(0x7f00000001c0)={&(0x7f0000000280)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @loopback}, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000380)="f44dbdf6e416395adf6dcdd16b17f5172e2e33184fa9409f3095628813ed926c67a83149610375e7383e3b5cc43d035db66045b2601c41f1fc666c7552122873dfd7f87c9efab77e270c416f27fe517c79d5fe14f10feb347e5f119eeb084962718a", 0xfffffffffffffd0a}, {&(0x7f0000000400)="315bd23845dd01c9180cfe67876302e3bd3367615ad90b3caccd7d7b9b141d9b0607c5b2439dd2d10e6e2135c6d57c7fb3efd943b1edf37f3ac01481769f57638652aeebb6d8092fa71c9191da22990ba2b6fbfd182f69502c2c3a89e1c5209ded098b4af718e7baf75e9073e834", 0x8}, {&(0x7f0000000480)="539dc2b5105a6b7e4c234f5a0709e91495659f6c82440f463f12fdddcc38b67440f977234184e635c9a1201e7cf596bcaf0cbfa19a374f3845b888c11444bf88a52fb8f8be6de372bbc6aba144e68a60fb12a6fa33ef0d27e4ed6f6f0b12eccad7189a67224857cdf8094c5877323403e3e69f6185e6f115de00926a107a03943f4c1f77ce2aed511c89cbfa9bdf337573f343ab0ed65ee540c9d58e21b78c074a09de924f1cb1be5438a9b2b17753ba", 0xb0}, {&(0x7f0000000540)="1dac36fc8d6059f6646b4e20b0b2fa9ce57d02e378723d6983d9780982581fceb18a6fb93543a4dbbd25ff8edcce652857f2a3780e6293e1438b7077936d511531e194cd4cd3e02ceb653be9cc34e999219ab8b3fb398424a37c2e5922e6a03ca6ca9776e7db234e87bbb5d67a81fe0c85cc5631127c182c2b6da8b7ecf36e788dc5e21895ef412eced78363e3e5b94c152e2043588c5c7ac3643fbf140a8a500ddb52e16989eb45065b", 0xaa}, {&(0x7f0000000600)="0a8af1dc01690c0d4e45a742563a7ef36f2e4416173536921e3e0a73c35c34a0b502ac10b2fbab8d78d24e5060f5903cee1ebaed493942e2684bb7fe12ea897415a489a53322c4f052a77106d882ba02ef834819ee145ab41b0a99ee65119394ac85681692fe4825013f31eee10a48d82eda07dd54a50034f5eb126798ca87f5b7d67fe05076770298b42f834a9331eaae06ab0658bbbc850dca1a44466e2daafbcfacef3d1d419bc94f7c40090041f191e72d36f36bc7221d6e4afa1ffce249fc29522a9949d236fb5d9aee", 0xffffffffffffff07}, {&(0x7f0000000040)="29286cb5e48ffcfd4ea30df34ec5784b6ee8f087a8f6150f44d07922f4ef74716d6e30b064fde918a1e8ff44ae8610ef12b2cc3f616847d02e8dd8", 0x3b}, {&(0x7f00000000c0)="45f93931a9f6732110b04b1f4b2273", 0xf}], 0x7}, 0x4000000) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0xd) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000900)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r8, 0x80000001) r9 = getuid() r10 = getuid() r11 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r11}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) r12 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r12}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) r13 = getgid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r15 = getgid() r16 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r16}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) setxattr$system_posix_acl(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='system.posix_acl_access\x00', &(0x7f0000000b00)={{}, {0x1, 0x4}, [{0x2, 0x1, r5}, {0x2, 0x4, r7}, {0x2, 0x7, r8}, {0x2, 0x0, r9}, {0x2, 0x1, r10}], {0x4, 0xa}, [{0x8, 0x1, r11}, {0x8, 0x5, r12}, {0x8, 0x0, r13}, {0x8, 0x3, 0xee01}, {0x8, 0x1, r14}, {0x8, 0x2, r15}, {0x8, 0x1, r16}], {0x10, 0x6c74f0d487de85fe}, {0x20, 0x4}}, 0x84, 0x0) r17 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r17, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r17, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x9, &(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRES64=r1, @ANYRESOCT=r17, @ANYRESDEC=r0, @ANYRESOCT=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r18, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) signalfd(r2, &(0x7f0000000300)={0x8}, 0x8) 22:18:48 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = getpid() r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r1, r1) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r3, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setfsgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000300)={{0x800, r4, 0x0, 0x0, 0x0, 0x180, 0x4}, 0x8001, 0x0, 0x9, 0x2, 0x0, 0x7, 0x0, r0}) r5 = dup(0xffffffffffffffff) timerfd_gettime(r5, &(0x7f0000000240)) sendmmsg(r5, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r6, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, &(0x7f0000000400)=""/101, 0xfffffc3e) fdatasync(r6) 22:18:48 executing program 3: semop(0x0, &(0x7f0000000140)=[{0x0, 0x3}], 0x1) semop(0x0, &(0x7f0000000080)=[{}], 0x163) semctl$IPC_RMID(0x0, 0x0, 0x10) 22:18:48 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) statfs(&(0x7f00000001c0)='./file0/file1\x00', 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 22:18:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r3, 0x80000001) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r4, 0x80000001) setresuid(r2, r3, r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x24) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x4472f62d27b2ea04, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r4 = socket(0x10, 0x8000000803, 0x0) write(r4, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r6, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x6, 0xfff8, 0x4008, 0xffffffe0, 0xfffffff8, 0x370, 0x80000000, 0x41a4, r6}, &(0x7f00000002c0)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000400)={r7, @in6={{0xa, 0x4e20, 0x7, @mcast2}}}, 0x84) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "736825ba8e3dce6179c9fc4c1427d318"}, 0x11, 0x2) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x1d7, 0x0, &(0x7f00000000c0)="40f088ca1fffffe1000040006f00000000000000e9a3b1b4", 0x0, 0x100, 0x6000000000000000, 0x0, 0xfffffffffffffc6f}, 0x40) pipe(&(0x7f0000000040)) 22:18:49 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x224000, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x486, 0x265) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000140)={'broute\x00'}, &(0x7f00000000c0)=0x78) 22:18:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x24) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x4472f62d27b2ea04, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r4 = socket(0x10, 0x8000000803, 0x0) write(r4, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r5 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r6, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x6, 0xfff8, 0x4008, 0xffffffe0, 0xfffffff8, 0x370, 0x80000000, 0x41a4, r6}, &(0x7f00000002c0)=0x20) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000400)={r7, @in6={{0xa, 0x4e20, 0x7, @mcast2}}}, 0x84) fsetxattr$security_evm(r0, &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@md5={0x1, "736825ba8e3dce6179c9fc4c1427d318"}, 0x11, 0x2) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0x1d7, 0x0, &(0x7f00000000c0)="40f088ca1fffffe1000040006f00000000000000e9a3b1b4", 0x0, 0x100, 0x6000000000000000, 0x0, 0xfffffffffffffc6f}, 0x40) pipe(&(0x7f0000000040)) 22:18:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = dup3(r0, r0, 0x140000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e683a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@sack_info={r5, 0x7, 0x2}, &(0x7f00000000c0)=0xc) 22:18:49 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0xfff, @empty, 0x1}}}, &(0x7f0000000700)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000740)={r10, 0x2c79}, 0x8) 22:18:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x6e, 0x31, &(0x7f0000000140)="7d52aeff3349a62e3e2a7ebaf84c2329f98df038ead65e974fec41663d5beafea2624304e48f08457e79ab44a7be1bc88afcad335ad31ac660059f7ad5683c75f766f8643a85ed86997ea75aa524a456c3d423f795d0163d595453163c3fc3b2e32fd4c5c26f04dea10d7c87fd13", &(0x7f00000000c0)="1efad8b112ec36108ad18481caef7cc29d343690dc3dfaa5b46bef596875324d90720baa6b0f9463af9717fe08901a3b3b"}, 0x40) 22:18:49 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0xa0201, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000140)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = getpid() r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r1, r1) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r3, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setfsgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000300)={{0x800, r4, 0x0, 0x0, 0x0, 0x180, 0x4}, 0x8001, 0x0, 0x9, 0x2, 0x0, 0x7, 0x0, r0}) r5 = dup(0xffffffffffffffff) timerfd_gettime(r5, &(0x7f0000000240)) sendmmsg(r5, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r6, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, &(0x7f0000000400)=""/101, 0xfffffc3e) fdatasync(r6) 22:18:49 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = getpid() r1 = socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r2 = dup2(r1, r1) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r3 = msgget$private(0x0, 0x0) msgsnd(r3, &(0x7f0000000040)={0x3}, 0x8, 0x0) msgrcv(r3, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setfsgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000300)={{0x800, r4, 0x0, 0x0, 0x0, 0x180, 0x4}, 0x8001, 0x0, 0x9, 0x2, 0x0, 0x7, 0x0, r0}) r5 = dup(0xffffffffffffffff) timerfd_gettime(r5, &(0x7f0000000240)) sendmmsg(r5, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x0) r6 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r6, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, &(0x7f0000000400)=""/101, 0xfffffc3e) fdatasync(r6) 22:18:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) sched_setparam(r1, &(0x7f00000000c0)=0x7f) process_vm_readv(0x0, &(0x7f0000000140), 0x0, &(0x7f0000001e80)=[{&(0x7f0000000a00)=""/138, 0x8a}, {&(0x7f0000000180)=""/96, 0x60}, {&(0x7f0000000ac0)=""/225, 0xe1}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/185, 0xb9}, {&(0x7f0000001c80)=""/197, 0xc5}, {&(0x7f0000001d80)=""/101, 0x65}, {&(0x7f0000001e00)=""/67, 0x43}], 0x8, 0x0) 22:18:49 executing program 0: ptrace$pokeuser(0x6, 0x0, 0x56ccab61, 0x7) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 606.642505][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 606.648370][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 606.802588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 606.808392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 606.814229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 606.821056][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:50 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8001, 0x1) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x7) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bind$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x1, @remote}}, 0x1e) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2040, 0x0) connect$pptp(r2, &(0x7f0000000180)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xe, 0x0, &(0x7f0000000080)=0xaf00) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000400)=""/234) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f00000001c0)=0x7) 22:18:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000e5000000003ae0a2cb4110e3662b5abc581b753a30586b7531061c11ca3424a9b588817410a02b911a44ca00d9dcf1ffae44a6ae55418899b295457e35893da96b07b45118a3892cac0677f34a4c35c3c128c825c50f453f0b5786e213e4745e8276f87820a1152c8fbb7cd991a7870306d17be60a494458ff8440caf309f9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x3}) write(r1, &(0x7f0000000340), 0x41395527) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x2}, 0x7) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x400080) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) 22:18:50 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/icmp6\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000400)=""/234) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000140)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) setsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f00000001c0)={0xcdfb, 0x644, 0x7, 0x3}, 0x8) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x3, 0x2, 0xff}, 0xa) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000180)) ioctl$SIOCX25SSUBSCRIP(0xffffffffffffffff, 0x89e1, &(0x7f0000000500)={'team_slave_0\x00', 0x100, 0x1000}) 22:18:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x102, 0x6000000000000000, 0x0, 0x5f, &(0x7f0000000000), &(0x7f0000000140)="0f5128ff6284d9e12b6e6a9af85ef281663ccfa9b0614e261715e82299990170119e74059e850fa7f16670d0b838f0dc596cc93b4323114421a21956ab54d15b10938cb3e9474e5be470e66bdde761b2e816a3b59b612e57fa5548b4365c9b"}, 0x40) 22:18:50 executing program 5: socket$kcm(0xa, 0x1002, 0x11) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffff8}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$kcm(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/\x9dero\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000040)={0x3, 0xec, 0x100}) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:login_exec_t:s0\x00', 0x22, 0x1) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eba06ec400002339e00586f9835b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$bt_rfcomm(0x1f, 0x1, 0x3) 22:18:50 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0xfff, @empty, 0x1}}}, &(0x7f0000000700)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000740)={r10, 0x2c79}, 0x8) [ 607.445086][T21095] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.5'. 22:18:50 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$usbmon(&(0x7f00000008c0)='/dev/usbmon#\x00', 0x20, 0xc295929962382f6e) write(r3, &(0x7f0000000880), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @rand_addr, @loopback}, &(0x7f0000000700)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000740)={'yam0\x00', r4}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000340), 0x41395527) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r5, &(0x7f00000007c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000780), 0x3, {0xa, 0x4e22, 0x5, @rand_addr="f07a228c5c5ec67c79a7691c82f7cbf3", 0x8}}}, 0x38) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r6, &(0x7f00000004c0)="480f8b5b21439bdbfca74c54c432106f04ab9309a0ad799bc08f26e183382b9afabfb5c598e04aa03ac7a25de14f4173ca445a183f5621ae71c1dd3afe0f9eeafb066dcbe8b66af1d7a2d2dc701f9a6b9beb74623af0669406a2d6cf7c00624ba4703198673c4ce8885d5e659d8d9e6171e50f9c74f1bf81d6a0ed7772f3c986e795ce1bac7bde40ae2db2957a516486b8339a9d3e2ff106466790dbd0274fcb42189c9dfc502115354fa63ce224694b0e8ed4", &(0x7f0000000580)="1ac9923c2716c4055742bc780027630e51724ba658c995154417b73fe434ce5492d93cd8ca1fbf277a725265d511f94fe27cd388b0087576d5fcb207028ef1d8584c273d92199e29cc68fc30f8405f1b4233572507076e130a6766e0a4c5fd9753806df29998cb5096d86a2b5f0ce6cedcf8eece7bc00755d67e07463f90cf3ac3e95709f38e2873df292a81f0c9d37e79ccdb8b23592cb1f51575adb2b94702c03bbea73a962d120655d17015271be9721354aa7ddc5bab26a733b289c81896daacccd2b8d380a61bef22da0a0e9062b34f71341b40ee82", 0x5}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r2, 0x0, 0xe, 0xbc, &(0x7f0000000040)="c041ca1cc3f0d6f2c66b31ce7b68", &(0x7f0000000140)=""/188, 0x20, 0x0, 0x1d, 0x73, &(0x7f00000000c0)="4841835c13ea9cdada76594c5be0b1d2a5cfed021cf92a6bfdf17f5753", &(0x7f0000000280)="bbc20bd64703233405e98b0a2f6ff1724c7da630865d09fe4de5b831a7b0f7bb19f9e992041d6f23b5c4085b909d14a93472463bc8f4165f69573005c8328eb023ff935ca5683f884ca395d24fd035c38167af43ec220754769f7cc8969df5cb59acf4963d4c223d2582ef95073573b83991d3"}, 0x40) ioctl$BLKIOOPT(r2, 0x1279, &(0x7f0000000480)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x800, 0x0) 22:18:50 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='s\xe81\xd8MP5\xb1\xd2\x17', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000140), 0x8, 0x10, &(0x7f0000000000)={0xfffffffd}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r3 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) keyctl$chown(0x4, 0x0, r2, r3) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x3, 0x0, [{0x0, 0x2}]}, @ptr={0x0, 0x0, 0x0, 0x4}]}}, &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x1}, 0x20) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000001c0)=0x379) 22:18:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x962b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003090000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000ad71e93b445f971d0404000001030060bf030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xe7, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xe2c7067d3008f5b1}, 0x48) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x2, 0x10000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000180)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3, 0x40c301) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0x1}) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x8, 0xaf7ea307df3a5657) [ 607.922522][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 607.928406][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x962b}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0x17}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000140)=ANY=[@ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRES64, @ANYBLOB="80c803f5b37e249cb17431e79d0ae84c1e1195c8b1af60378b836a13e6f42b81d97746f2e545010192f0fc999373be016acac517c5b067c402946e0d302599a221143bd65f67b13e710ebef959444ea8810faea90ba509bac4e7f14700216e5cfc75f0c7b75352f46361420518724fd2be2a440958708b667b8112c0f7bb96b837816510691195ac78876e0d61a8f6308426ae6bf8a406425e82f02db9d59f4b3d949432a5b2bf03c7622d8334eccc38af94482aa2b122571ddc42e484846f8950e2b20230da457cac2c2457", @ANYRESOCT, @ANYRES16]], &(0x7f0000000600)='syzkaller\x00\xb0\xaf\xc7\x95#m\x81\xe9\xa5\xa6\xc2\x18b~ha\x17\xad5\"\fh\x1f\xc7\x9e\xfe\x13~\xdf\f\x06\x06^X\x1a\xef\x18\t\xce`\xe1\xad`\x84]O\x9c\xe1\x1b\xfe\x01\xe4Tc\xbf\xdf\x03\xf4A\xc0%\xb4\x8f\"\xb1\xb6\xc68,\x04\aI\x9e\x05\xe2cQ\xc0\xe1\xf8\xe3\xed\xfa\vS\x8cN\b\x0e', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x5}, 0x10}, 0x70) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000300)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x102000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r4 = socket(0x10, 0x8000000803, 0x0) write(r4, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) socket$inet(0x2, 0x80001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r6, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r6, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000003c0)={r6, 0x45, 0xa, [0x5, 0x3ff, 0x4, 0x7f, 0x9, 0x2, 0x9, 0x5, 0x8, 0x7fff]}, &(0x7f0000000400)=0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000440)={r7, 0x8000, 0xfffa, 0x5, 0xd3, 0x7f}, &(0x7f0000000480)=0x14) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@random={'osx.', ')wlan0-wlan1eth1,trusted(}bdev:usernodev\'--system\x00'}, &(0x7f00000002c0)='syzkaller\x00', 0xa, 0x3) 22:18:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xa9, 0x0, &(0x7f0000000140)="b9010efffff00000009e40f088ca1fae4e8564520691deffffe100004000633377fbed09e6c3b0c5dc3b89584739b54db84d437a584e9d4f95a2268680c979fcb559166ab2d6c3273657aca50bb9fc5a450e42dc9c7a7cfd8adf5ec47f997c6310aa5c699bfe8524c1fa2aa6f9d3b4e8ef4a431f95fbfba7533e9e906ee2a1100f02321b0716f2d41c44029e965b83cdaec19b5290b52cda8e798cb73452f2d5c3c5b31e236f707880", 0x0, 0x100, 0x6000000000000000}, 0x40) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x105080, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x8001005, 0x1, 0x1}) 22:18:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000700000000fefff67b0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010004000404000001007d60b7030000000010006a0a00fdfffefc00850000000d000000b7000000000000009500000000000400"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept4$unix(r2, &(0x7f0000000280), &(0x7f00000001c0)=0x3e, 0x40800) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) ioctl$KVM_SET_IRQCHIP(r3, 0x8208ae63, &(0x7f0000000480)={0x0, 0x0, @pic={0x7, 0x81, 0x7, 0x6, 0x5, 0x8, 0x4, 0x0, 0x7, 0x2, 0xd0, 0x53, 0x1, 0x1, 0x1f, 0x4}}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040), 0x10) 22:18:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000006000000000000001d7a59c235259365859e074d32c16685146d52542ede45a46df6be1a284c893528d09632fcc82258eb7cca37136a6a9937242dfc564c92e30ddd7cddc87bfada51c609489ecf7b7b71bd6d44352c1fbf164cc72da3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x4c268ae3, 0x6000000000000000, 0x289}, 0x40) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x10001, &(0x7f0000000380)={'trans=unix,', {[{@loose='loose'}, {@debug={'debug', 0x3d, 0x7fffffff}}, {@version_u='version=9p2000.u'}, {@cache_loose='cache=loose'}, {@access_client='access=client'}], [{@subj_user={'subj_user', 0x3d, 'ppp0\x00'}}]}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x44a0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000002c0)) process_vm_readv(r2, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000300)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000400)={{0x4, 0x0, 0x7fff, 0x1ff, '\x00', 0xffffffff}, 0x0, 0x8, 0x6, r2, 0x6, 0x9, 'syz0\x00', &(0x7f0000000140)=['cpusetvmnet1posix_acl_access+vmnet1cpuset,3}user\x00', 'syzkaller\x00', 'syzkaller\x00', '\x00', 'GPL\'!#[selinux-\x00', 'ppp0\x00'], 0x5b, [], [0x5, 0x7f, 0x915, 0x7]}) [ 608.242524][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:18:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000100)=0xfffffffffffffd91) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {0xfffffffffffffffd}, 0x4000}, {{@in=@multicast2, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=@newspdinfo={0x27c, 0x24, 0x400, 0x70bd2a, 0x25dfdbfe, 0xba1f, [@etimer_thresh={0x8, 0xc, 0x3}, @algo_comp={0x130, 0x3, {{'lzs\x00'}, 0x740, "dba0af97d35bdc9c09a2d8332f8e25ff885dc7b65feb0cb4dd6f10e0fd4afda6f6da6bccbaa937ce6d91f2a9dd51e1a108e2df1cb7bd017f69511fa7dd810858dbaac4439e6deedd859904f4966cbbfb4cbcff0f37e21d757d4ff715c6fe7d061a00a557aa40e4b41f5e524ab6f04089a8946683e58a6625e48d4f22fc53a0c5ffde3068bd7a714d0676b54e545e676ae01aca68c9539e671fe1a677f7ccd1ffdeece2b36cc17ec56e825bbed6737658ac4fabcf372981f88cf1016fd47cb2fef43d544203cc7280c181be03501182c9f4b7c656889249824539635c0a11c490a0f6bd40a93db9fd"}}, @ipv4_hthresh={0x8, 0x3, {0x19, 0x1b}}, @algo_auth_trunc={0xe0, 0x14, {{'sha3-256-ce\x00'}, 0x4a0, 0x40, "2f0f22a2ee5dee1b6689264158523eaa3019188d3367d88dae0e1dbad02dde1985b61eb9ffca4b7dc7d53c7031708e901d9493096f9001ee0a5b7c562f58eb7201125460fd5cfc571d608c307cf6eafc57ddec17a3a969ac209aede3328944196af0d5a53001bdf160af4c2c76c688bc42a268f8e13a682cf778b9bc333ea56868698256721bdee8f488ba6884bd342379f0157b"}}, @user_kmaddress={0x2c, 0x13, {@in6=@local, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0xa}}, @etimer_thresh={0x8, 0xc, 0xffff}, @offload={0xc, 0x1c, {r3}}, @extra_flags={0x8, 0x18, 0xffffffe0}]}, 0x27c}, 0x1, 0x0, 0x0, 0x7d8aa82f7e33721e}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:51 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0xfff, @empty, 0x1}}}, &(0x7f0000000700)=0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000740)={r10, 0x2c79}, 0x8) 22:18:51 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x4, 0x6801) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f00000001c0)={0x2, 0x2, 0x2, 0x33, &(0x7f00000000c0)=""/51, 0x6f, &(0x7f0000000140)=""/111, 0x60, &(0x7f0000000280)=""/96}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000078ed009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000004c0)="366929e290ccf4e86a87dcccda079d03f1898a80b023cd95442c4b73054aed8a271df9ccdf7336cb6ffa4077a4b1228e044d6312b518d8dff67084c534e5c483acb0823009f1dd679b5a3eb667e9f79ef5e32aa078ce2b12fecaa17e6e222b570260a8db0397e6345659503a536d44afeb4c4c9f382f0675ad9fc9d8a6c285f4c9b3ff2fcc4b4cf93c87dabfdc10e93d43bec57344dc4f4167c9b3c8b59aeee13ff609231182d6c216e7bbbcb361c35765da4f93546b3587f1814c948fc352f39cfc67ac9ecdb19eb9fa", 0xfffffffffffffe86) r2 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x48181) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000200)=0x4) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000680)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000780)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, r4, 0x200, 0x70bd29, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0x4004041) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x2091240}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x14, r4, 0x1, 0x101, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000000}, 0x43357d25e9359f0b) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r4, 0x4, 0x70bd26, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004095}, 0x4100) 22:18:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x161, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x1}, 0x10}, 0x70) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0xa8, 0x80, &(0x7f0000000140)="336c5d8cb1f4d433b1101436c194d71e24f58d3e4274f38e2a57137243842638006cd803c77b2b523bafa7d20caacae6024c2e106dc0bcb50f74c8c0c152fae80f0b1e4c5661569d00eae6e3916c7f4fc395ad3cb90db005fc8ce8f36a88a71fe8e247d56313c5192c237b786a8c833c9cefbf311725053a86237a78f5dc9eb62b3d89ee9ab6f91ecd24e410136ce5a6271e2a3bcc7babdfe11b8ffcf0c400ace63f4b42aea1d8f7", &(0x7f0000000280)=""/128, 0xe6, 0x0, 0xe0, 0x1000, &(0x7f0000000400)="e6bf332ed32f601ffccd8d0b5457f17721fb51ca71f31ca6a45e6e43a32e42f2d969893e95a130d7f3095f40e1f466e5d2dc49eb690c424891b95a98719940ae2ab8f9635f8728d191c97cbc916b531de76f7eb90aa6653ab4e3b17535ff430b3b9494e20cc143327cf1dbd76ad2b893e2555b0b393cb110a373d08b39636a20a6bcb7e1a5a2e349825905f436e8e7c6c2f9e9c5c78514ce58181d4e9cf8bcb082afe7288b04c3897fb0d4f62a86a26ccd4e5ba821ffcb829efd4db8ff65ecb1f754e59be313e12d58518b6ac6f0ad328d032b7c18ff69c40e2b089a58f01f36", &(0x7f0000000500)="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"}, 0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_cache\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) dup(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r5 = socket$l2tp(0x18, 0x1, 0x1) listen(r5, 0xffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r3) accept4(r4, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r6 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x8040ae9f, &(0x7f0000001500)) [ 608.722525][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:18:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) process_vm_readv(r1, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d6bb7030000000000006a0a00fe000000008500000026000000b7ace264330a0cbf6e08d472ca3cb9c3fe2e8a1dfd9dbcbb79d68e19c175b61a266a284a7fcd49ab4a305bbea8c1e07ccf518f886c53a1b9cc77998fd8125976bbf8bdfd00c68e87e2db2a037814122b5da1512081fd8357dc9876799b3bead00ed0e5f8554f9f5bb7d3239dcd753aae6ef237b219488b43d269db000000000000000000000000000000006a3fd6a7ec78cedae6776c50a965dbfd4833045ef1bb6029b1d264f9619efdae54ce5e17b33c43d81149cea4f5be845a5e02be4babc4e99775513aa7"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r3, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r4}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r2, 0x0, 0xf, &(0x7f00000000c0)='vmnet1security\x00', r4}, 0x30) 22:18:51 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x8000, 0x0) r2 = accept$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @netrom}, [@bcast, @bcast, @rose, @netrom, @rose, @bcast, @netrom, @null]}, &(0x7f00000000c0)=0x48) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000400)={r1, r2, 0xfec, 0x78, &(0x7f0000000280)="59b29b0d59c60892032ba16732b6239f7b7a22326522efc98c3160ab8ff429ee0272a9eaa0cc1e207a2ddb98454025a5bbed4a13a64fa94b5ef8b3c0091fc6e5addf78ad52c03a20bbebf9faf6eee0ce9646e71087eb45568f92262c9a64e1aa96ef9948938a3ac3a966e3264e5bd9ed7ab576f411358930", 0x80, 0xb1, 0x7, 0x0, 0x9fc2, 0x0, 0x8, 'syz1\x00'}) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x9, &(0x7f00000001c0), &(0x7f0000000300)=0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x8040) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="5c00000014005bc40000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000f1a31bb714ffe73a79d8b75f0cf95f36e140d5b2b71a468294c5692918ae92472174e76ff07966ee10ef98beb3660a7914ce6f1f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000c0015000000000000000000"], 0x5c}}, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x8, &(0x7f00000000c0)=0x140000, 0x4) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f0000000140)=""/83) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 609.121754][T21165] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 22:18:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000380)=ANY=[@ANYRESHEX], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0xb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='@\x00\x02\x00\x01\x00Z\x8bs\x14', 0x111a02, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) prctl$PR_SVE_GET_VL(0x33, 0xe19e) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e20, 0xb73, @remote, 0xfffffc00}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r5, 0x8, 0x3, [0xfff, 0x800, 0x38a9]}, 0xe) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x24c, &(0x7f0000000100)="b900438888cf88ca1fffffe100004000633377fbac14140fe9a33fa1000000000000", 0x0, 0xfc, 0x6000000000000000, 0x0, 0x37e, &(0x7f0000000400)}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = accept(r1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r4 = socket(0x10, 0x8000000803, 0x0) write(r4, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r5 = socket$inet(0x2, 0x80001, 0x0) r6 = dup(0xffffffffffffffff) ioctl$RTC_UIE_OFF(r6, 0x7004) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[], 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f00000000c0)={r7, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000280)={r7, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000140)={r7, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) 22:18:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7e7ffffff0000006a0a00fee9000000850000000d000000b700000000000000950000fbff000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x4b, 0x0, &(0x7f0000000140)="4f8aba383f802efdc58542d216cc86fc650d03da6920fcafa3877f6881b5ca33b6eda0f8ccbc1366ee89a8b2648b144bd24a520681c13682d8a82df08a2d869e3ede7d96a3d9404a6f6474"}, 0x40) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000280)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r3, 0x80000001) r4 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) r5 = getuid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd5, 0xd5, 0x5, [@var={0xa, 0x0, 0x0, 0xe, 0x2}, @var={0x5, 0x0, 0x0, 0xe, 0x4}, @datasec={0xc, 0x5, 0x0, 0xf, 0x1, [{0x4, 0xe0000000, 0x8}, {0x4, 0x7, 0x401}, {0x5, 0x400, 0x9}, {0x4, 0x4, 0x1}, {0x3, 0x372, 0x4}], 'U'}, @union={0xc, 0x8, 0x0, 0x5, 0x0, 0x2, [{0xe, 0x4, 0x7}, {0x3, 0x1, 0x1}, {0xe, 0x2, 0x7}, {0x8, 0x4, 0x60}, {0xa, 0x4, 0x9}, {0x3, 0x4, 0x3}, {0xe, 0x4, 0x3ff}, {0xb, 0x1, 0x8}]}]}, {0x0, [0x0, 0x0, 0x36]}}, &(0x7f0000000040)=""/37, 0xf5, 0x25}, 0x20) write$P9_RSTATu(r2, &(0x7f0000000480)={0x7a, 0x7d, 0x1, {{0x0, 0x5b, 0x6, 0x6, {0x54, 0x1, 0x3}, 0x90000000, 0x3892438a, 0x6, 0xc0, 0xa, 'syzkaller\x00', 0xa, 'syzkaller\x00', 0xa, '\\mime_type', 0xa, 'syzkaller\x00'}, 0xa, 'syzkaller\x00', r3, r4, r5}}, 0x7a) 22:18:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feff7f7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000000404000001007d60b7030000000000006a0a00fe000000e2840000000d000000b7000000000009000000000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:52 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ff000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b754361363000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r1}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="cf"], 0x1) fallocate(r5, 0x0, 0x40000, 0x4) fallocate(r4, 0x0, 0x0, 0x110001) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xd000000, r5, 0x0, 0x8}) r6 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='\t\x00') sendmsg$NBD_CMD_STATUS(r4, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x38, r6, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r3}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x400d080) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000022}, 0xc, &(0x7f0000001540)={&(0x7f0000000280)={0x74, r6, 0x10, 0x0, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x20}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x28ee}]}, 0x74}, 0x1, 0x0, 0x0, 0x400}, 0x10000000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) r10 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3347, 0x380000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f0000000340), 0x41395527) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x60008002}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x58, r6, 0x0, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r7}]}, @NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x9}, 0x8810) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045519, &(0x7f00000000c0)=0x8000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x103002, 0x0) write$apparmor_exec(r2, &(0x7f0000000180)={'stack ', 'syzkaller\x00'}, 0x10) 22:18:52 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e20, 0xfff, @empty, 0x1}}}, &(0x7f0000000700)=0x84) 22:18:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xace484cc4dc00ed6) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x8, &(0x7f00000000c0)=@raw=[@alu={0x7, 0x0, 0x2, 0xa, 0x4, 0xfffffffffffffffc, 0x10}, @call={0x85, 0x0, 0x0, 0x13}, @call={0x85, 0x0, 0x0, 0x6f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @map={0x18, 0x3, 0x1, 0x0, r1}, @ldst={0x6, 0x1, 0x2, 0x0, 0xd81c505b5cba0a3e, 0xfffffffffffffff8, 0xfffffffffffffff0}], &(0x7f0000000140)='GPL\x00', 0x20000000, 0x0, 0x0, 0x0, 0x4, [], r2, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xc, 0x20, 0xd52}, 0x10}, 0x70) 22:18:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000480)=""/255) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040), 0x4) 22:18:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400014b437bdaca45380000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8000, 0x10) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000480)=""/4096) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000280)={&(0x7f00000000c0)=[0x8, 0x5, 0x3ff, 0xffffffff, 0x0, 0x0, 0x714, 0x946, 0x80000000], 0x9, 0x9b8, 0x4, 0x100, 0x5, 0xfff, {0x1, 0x3f, 0x5, 0x9, 0x2, 0x3, 0x8, 0x6, 0x6, 0x2, 0xfff, 0x713, 0x1, 0x5, "161009f0b2aad2b004529357957a8132d36329114044a866742bd84ad48c0a86"}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$CAPI_INSTALLED(r2, 0x80024322) 22:18:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7033b6e4c451afc0000000000006a0a00fe00000000850000000d000000b7000000000000009500"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x11f, 0x12f, &(0x7f0000000400)="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", &(0x7f0000000540)="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"}, 0x40) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x30d103) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r5, 0x3f, 0x8, 0x9, 0x1, 0x5}, 0x14) 22:18:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00()\x89\xe5\x14^W\x86\xa3\x14K|\x0e\xfe-\x9d\xbe\xca`\n\x1a', 0x275a, 0x0) write$P9_RSTAT(r3, &(0x7f0000000080)=ANY=[@ANYPTR], 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x40000000011, r3, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)={0x14, 0x0, 0xfffffffffffffffb}, 0x14}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c8]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000004c0)={0x2, 0x4e23, @broadcast}, 0x10) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2379c6130c65ef0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r7, 0x80404508, &(0x7f0000000d80)=""/142) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f0000000c40)=[@in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0x5, @dev={0xfe, 0x80, [], 0x29}, 0x7}, @in6={0xa, 0x4e24, 0x123f, @dev={0xfe, 0x80, [], 0xb}, 0x9}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x87, @dev={0xfe, 0x80, [], 0x15}, 0x6}], 0x94) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x200, 0x6}}, 0x20) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f00000003c0)=0xe56, 0x4) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$RDS_FREE_MR(r9, 0x114, 0x3, &(0x7f0000000480)={{0x4, 0x8}, 0x42}, 0x10) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xfffffd9c, &(0x7f0000000500)={&(0x7f0000000380)={0x1c, r8, 0x100, 0x270bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20080}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r8, 0x7c28c5c9065265db, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x2a7, @link='broadcast-link\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x840}, 0x0) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 22:18:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00'}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x0, 0x6, 0x0, 0x6, 0x0, 0x8, 0x8000, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffff23d, 0x3, @perf_bp={&(0x7f00000000c0), 0x7}, 0x702, 0xf94, 0xd3, 0x8, 0x8, 0x8000, 0x4}, 0x0, 0x6, r2, 0x1) 22:18:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x9, 0x8, 0x0, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x105000, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x4001, 0x0) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000400)={0x3, 0x800, 0x8, 0x0, 0x0, [{r1, 0x0, 0x8}, {r0, 0x0, 0x100000001}, {r2, 0x0, 0x4}, {r3, 0x0, 0x7}, {r4, 0x0, 0x3}, {r0, 0x0, 0x80000000}, {r5, 0x0, 0xff}, {r6, 0x0, 0x1}]}) 22:18:53 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) ioprio_set$uid(0x3, r1, 0x80000001) ioprio_set$uid(0x3, r1, 0x0) r2 = getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}, {0x0, 0x0, 0x0}], 0x2, 0x20000000) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpeername$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x52400, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r6, 0x12, 0x2, &(0x7f00000001c0)=""/15, &(0x7f0000000280)=0xf) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x35, 0x1000, 0x1ff, 0x4, 0x198, r3, 0xa2db, [], r5, r7, 0x3, 0x2}, 0x3c) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x8000, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x20}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x20000000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@dont_hash='dont_hash'}, {@obj_user={'obj_user', 0x3d, 'proc\\mime_type'}}]}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) 22:18:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x8915, &(0x7f0000000040)={'erspan0\x00', @ifru_ivalue=0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000140)=0xb) 22:18:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ffb20bffff79a4f0ff00fbffffb6060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000900000000009500000000000000d612c8972933c3b90fd4871a301deef51c397f731ee14027b26e9f6cff"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r2, 0x80000001) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getgroups(0x3, &(0x7f0000000400)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) getgroups(0x2, &(0x7f0000000440)=[0xee00, 0xee01]) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000600)={{}, {0x1, 0x5}, [{0x2, 0x2, r2}], {0x4, 0x4}, [{0x8, 0xb, r3}, {0x8, 0x2, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r6}, {0x8, 0x2, r7}, {0x8, 0x1, r8}], {0x10, 0x2}}, 0x5c, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x1a, "143e0d008ec5b6538d2eb79407fdcbdc31f11a8fb7ba9c50b557"}, &(0x7f00000000c0)=0x3e) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, [], 0x1c}, 0x7fffffff}}, 0x0, 0x4, 0x0, "67ab296a12a80bfaa70ae133e4a52d3a8f9093aea5cb456e41d01554f6faf72e0bc157afeafa2ca0a1cb3d17ee2ade7beaa88d4bcd80c945f53b9edccdcf169d40f8221e3bd74e44523a20732e4dcba0"}, 0xd8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0x4) 22:18:54 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x4, 0xb62d0d749bf0836c) getpeername$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002340)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc3cfea7079c7e483, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702d76007000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, r0, 0x8, &(0x7f0000000000), 0xfffffffffffffe1f, 0x10, &(0x7f0000000000), 0x9}, 0x70) fanotify_init(0x0, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x4f, 0xffffff11, &(0x7f0000000140)="b9010effb06ff000144fe9a33e23e0f6885ddd1f498e3b0b5a9b9e80fac40af91938c3b46abaf64b2f7d92abe4a6733861e4e61919af8b148116d1469c887be706b65393e81433fb12400842028188", 0x0, 0x9ce, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000400)="b6e1b3724ea99c5bac6076b1d452ed58ad12764d40ed4f9dcb2b7555a4177e52410909ff5a30b42283f47659d69f3e38e7751b6a604a99ff55f836527efe77904e7dd49596047735cc1a88216cabee252b29c7428987e09b471f279c0c6730c51557bc4e076840387c1a734f088182d6cc0d770104228d536ae3ee51f4f4df009e9cd48180b6019f127ab59ff938e4ef4d2850fe46375af288b90501973b8323f00000000000000000000000000000cadf7c0b10f3a0f1b8411f068b40f7728804cc0a1b4515"}, 0x40) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff7, 0x8000) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_TSC_KHZ(r3, 0xaea2, 0xffffffff) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) mknod(&(0x7f00000000c0)='./file0\x00', 0x100, 0x81) 22:18:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r3 = socket(0x10, 0x8000000803, 0x0) write(r3, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r4 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$vsock_dgram(r6, &(0x7f0000000400)={0x28, 0x0, 0x0, @my=0x1}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SIOCX25SCALLUSERDATA(r7, 0x89e5, &(0x7f0000000480)={0x79, "9d8bcdb034d2933c9820a05038c636c2ece8f56e15db77ddb49c9045df8ce3aa356a2aec82d5b35178c3a29ffad1118ff7b79a3ab785be910a7162ddd53b6da03f646b18d555f2cae4c4d0de8784a8a66e128a700aaceea22e991936154edf825880b49ec8fae215b4395c31b62aaa2eee97e0e1b1b3735e30eb6788bd6bd2bb"}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r5, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) r9 = socket(0x10, 0x8000000803, 0x0) write(r9, &(0x7f0000000040)="220000002000070700be000009000701020000000000000000200000050013800100", 0x27a) r10 = socket$inet(0x2, 0x80001, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000001000)=ANY=[@ANYRES32=r11, @ANYBLOB="00000100b112cfa17538ed285ed2a998640ffbd93a17ef8737d669a6c257fb9e613a810f4741cf374b77310adc70aad2567f0d"], 0x9) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f00000000c0)={r11, @in6={{0xa, 0x4e23, 0x3f, @empty}}, 0x6, 0x401}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000280)={r11, @in6={{0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast1}}}, 0x0, 0x8}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=r11, &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={r5, 0x0, 0x1, 0x8001, 0x3ff, 0x6, 0x7, 0x5, {r12, @in={{0x2, 0x4e23, @loopback}}, 0x4ae, 0xb94, 0x5, 0xfffffffc, 0x7f}}, &(0x7f0000000280)=0xb0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0xfffffffffffffd94, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x5f, &(0x7f0000000000), &(0x7f0000000540)="8f3f61285adc27ac5247322649e0bc40c23f039e5518b2f9c17077b4bdebd07c3df16c5ec39b2fec0d51d703000000000000004acb93a2e342c8312140b5b2e3902cd80916779660fc3104790a6f0bb333fe71060d1092804fc240552c6389"}, 0x40) 22:18:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) pipe(&(0x7f0000000440)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x113}) 22:18:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0}, 0x68) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4600ff40015594000000000000000003002000000000000000000000004000000000000000000000000000000000000000000038000000000000000104050000001f000000010000000000000000000000000000000000000000000000050000000000000000000000000000000000c3631ab60000"], 0x78) r2 = memfd_create(0x0, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x5, 0x40, 0x3ff}, 0x8) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3c008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140)="73844ae89d", 0x5}]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:54 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) 22:18:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/keycreate\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b7020000031f0000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x10100, 0x6000000000000000, 0xfef0, 0x2e2, &(0x7f0000000000), &(0x7f0000000140)="e3891d24d9b652d0f7a9fd3751f663dc13a95b2382a9fc15a8e65dc8ca025a2df3e95e93cd9f18435ae6d8fb69bf8e6c4319bdef15b97eecd0f42705cf13e095e05b2ab64161521028727f2afda3094081f4bcf9bc452ea8df11f2f400000000000000000000000000000056e7e66d1f855bc93f99d62bba61ae91"}, 0x28) 22:18:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0}, 0x68) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4600ff40015594000000000000000003002000000000000000000000004000000000000000000000000000000000000000000038000000000000000104050000001f000000010000000000000000000000000000000000000000000000050000000000000000000000000000000000c3631ab60000"], 0x78) r2 = memfd_create(0x0, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x5, 0x40, 0x3ff}, 0x8) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3c008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140)="73844ae89d", 0x5}]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xe0ffffff}, 0x28) 22:18:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xf0ffff}, 0x28) [ 612.082524][ C0] net_ratelimit: 17 callbacks suppressed [ 612.082538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 612.094043][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:18:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x60000000}, 0x28) 22:18:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xfffff000}, 0x28) [ 612.402799][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 612.408790][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 612.414604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 612.420351][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:18:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xe000000}, 0x28) 22:18:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xe}, 0x28) 22:18:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xfffffffe}, 0x28) 22:18:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0}, 0x68) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="7f454c4600ff40015594000000000000000003002000000000000000000000004000000000000000000000000000000000000000000038000000000000000104050000001f000000010000000000000000000000000000000000000000000000050000000000000000000000000000000000c3631ab60000"], 0x78) r2 = memfd_create(0x0, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0)=0xf18001, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x5, 0x40, 0x3ff}, 0x8) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3c008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000140)="73844ae89d", 0x5}]) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)) 22:18:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x2000000}, 0x28) 22:18:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xffffffe0}, 0x28) 22:18:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xe0ff}, 0x28) 22:18:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x1400}, 0x28) 22:18:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x1000000}, 0x28) 22:18:56 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) 22:18:56 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) r8 = syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') ioctl$USBDEVFS_REAPURB(r8, 0x4008550c, &(0x7f0000000500)) pipe(&(0x7f0000000440)) 22:18:56 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x3f000000}, 0x28) 22:18:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xffe0}, 0x28) 22:18:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:18:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0xa00}, 0x28) 22:18:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xffffffff}, 0x28) 22:18:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x14}, 0x28) 22:18:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x14000000}, 0x28) 22:18:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xa000000}, 0x28) 22:18:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x1000000}, 0x28) 22:18:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xf0ffff}, 0x28) 22:18:57 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) syz_open_procfs(r7, &(0x7f00000003c0)='net/if_inet6\x00') 22:18:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xa}, 0x28) 22:18:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xffe0}, 0x28) [ 614.482569][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 614.488384][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 614.494206][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 614.500015][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:18:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xe0ffffff}, 0x28) 22:18:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x1400}, 0x28) 22:18:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x20000000}, 0x28) 22:18:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xa00}, 0x28) 22:18:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xe00}, 0x28) 22:18:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0xe}, 0x28) 22:18:58 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) 22:18:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x14}, 0x28) 22:18:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x4}, 0x28) 22:18:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x4}, 0x28) 22:18:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x60000000}, 0x28) 22:18:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x20000000}, 0x28) 22:18:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xe0ffffff}, 0x28) 22:18:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xe000000}, 0x28) 22:18:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xa000000}, 0x28) 22:18:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x4000000}, 0x28) 22:18:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xf0ffff}, 0x28) 22:18:58 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xffffffff}, 0x28) 22:18:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) 22:18:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xf0ffff}, 0x28) 22:18:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xf0ffff}, 0x28) 22:18:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xe0ff}, 0x28) 22:18:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x3f00}, 0x28) 22:18:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f00000002c0)) process_vm_readv(r7, &(0x7f0000000780)=[{&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/202, 0xca}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/6, 0x6}], 0x4, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/206, 0xce}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/106, 0x6a}], 0x3, 0x0) 22:18:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xe}, 0x28) 22:18:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x2000}, 0x28) 22:18:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x4}, 0x28) 22:18:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100}, 0x28) 22:18:59 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) getpid() 22:18:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x14000000}, 0x28) 22:18:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x14}, 0x28) 22:18:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0xa}, 0x28) 22:19:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x2000, 0x6000000000000000}, 0x28) 22:19:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x1e0, 0x6000000000000000}, 0x28) 22:19:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x104, 0x6000000000000000}, 0x28) 22:19:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x1e0, 0x6000000000000000}, 0x28) 22:19:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x114, 0x6000000000000000}, 0x28) 22:19:00 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r2, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000040)=0x1) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r5, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r4, &(0x7f0000000040), 0x10256}]) io_destroy(r1) statx(r5, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r6 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x500, 0x6000000000000000}, 0x28) 22:19:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x114, 0x6000000000000000}, 0x28) 22:19:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x10a, 0x6000000000000000}, 0x28) 22:19:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x10e, 0x6000000000000000}, 0x28) 22:19:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x104, 0x6000000000000000}, 0x28) 22:19:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) statx(r4, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) r5 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) setsockopt$XDP_UMEM_FILL_RING(r5, 0x11b, 0x5, &(0x7f0000000280)=0x8, 0x4) 22:19:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x104, 0x6000000000000000}, 0x28) 22:19:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0xa00, 0x6000000000000000}, 0x28) 22:19:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x7c, 0x6000000000000000}, 0x28) 22:19:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x82, 0x6000000000000000}, 0x28) 22:19:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x71, 0x6000000000000000}, 0x28) 22:19:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x6d, 0x6000000000000000}, 0x28) 22:19:01 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) statx(r4, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x0, 0x2) 22:19:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x6a, 0x6000000000000000}, 0x28) 22:19:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x60, 0x6000000000000000}, 0x28) 22:19:01 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x64, 0x6000000000000000}, 0x28) [ 618.652499][ C1] net_ratelimit: 2 callbacks suppressed [ 618.652511][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 618.663947][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 618.669754][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 618.675518][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:19:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x5d, 0x6000000000000000}, 0x28) 22:19:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x69, 0x6000000000000000}, 0x28) 22:19:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x59, 0x6000000000000000}, 0x28) 22:19:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x56, 0x6000000000000000}, 0x28) 22:19:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) statx(r4, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) 22:19:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x58, 0x6000000000000000}, 0x28) 22:19:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x5c, 0x6000000000000000}, 0x28) 22:19:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x4e, 0x6000000000000000}, 0x28) 22:19:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x4a, 0x6000000000000000}, 0x28) [ 619.282508][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.289191][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 619.294989][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 619.300743][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:19:02 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x56, 0x6000000000000000}, 0x28) 22:19:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x48, 0x6000000000000000}, 0x28) 22:19:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x54, 0x6000000000000000}, 0x28) 22:19:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x47, 0x6000000000000000}, 0x28) 22:19:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x44, 0x6000000000000000}, 0x28) 22:19:02 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) 22:19:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) statx(r4, &(0x7f0000000480)='./file0\x00', 0x1000, 0x100, &(0x7f0000000780)) 22:19:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x4b, 0x6000000000000000}, 0x28) 22:19:02 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x37, 0x6000000000000000}, 0x28) 22:19:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x36, 0x6000000000000000}, 0x28) 22:19:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x35, 0x6000000000000000}, 0x28) 22:19:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x37, 0x6000000000000000}, 0x28) 22:19:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x34, 0x6000000000000000}, 0x28) 22:19:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x32, 0x6000000000000000}, 0x28) 22:19:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) 22:19:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r1, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000040)=0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r4, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000040), 0x10256}]) io_destroy(r0) 22:19:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x38, 0x6000000000000000}, 0x28) 22:19:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x2f, 0x6000000000000000}, 0x28) 22:19:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x2f, 0x6000000000000000}, 0x28) 22:19:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x29, 0x6000000000000000}, 0x28) 22:19:03 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x37, 0x6000000000000000}, 0x28) 22:19:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)=0x1) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') ioctl$USBDEVFS_DISCSIGNAL(r3, 0x8010550e, &(0x7f0000000300)={0x10000, &(0x7f0000000400)="0177674c3f9c3f1ba7a64ee5f2664c6591409b96e0e48ca6a8b7648cabb48edc2fe68a9edbb3015bdc212957008a4ed0c5f1f19691d30df24720bd1d2e5c2f5556e1817eec1349e2aa35660f9995516a1e4a5925d87e8076433f3d2340f1469479290f1a4706a6afe865fc7179897f69"}) 22:19:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x36, 0x6000000000000000}, 0x28) 22:19:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x29, 0x6000000000000000}, 0x28) 22:19:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x25, 0x6000000000000000}, 0x28) 22:19:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x25, 0x6000000000000000}, 0x28) 22:19:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x22, 0x6000000000000000}, 0x28) 22:19:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x2d, 0x6000000000000000}, 0x28) 22:19:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x36, 0x6000000000000000}, 0x28) 22:19:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x1d, 0x6000000000000000}, 0x28) 22:19:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x24, 0x6000000000000000}, 0x28) 22:19:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x1b, 0x6000000000000000}, 0x28) 22:19:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)=0x1) syz_open_procfs(0x0, &(0x7f00000002c0)='net/sctp\x00') 22:19:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x17, 0x6000000000000000}, 0x28) 22:19:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x14, 0x6000000000000000}, 0x28) 22:19:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x13, 0x6000000000000000}, 0x28) 22:19:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x13, 0x6000000000000000}, 0x28) 22:19:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x10, 0x6000000000000000}, 0x28) 22:19:04 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0xa, 0x6000000000000000}, 0x28) 22:19:04 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000040)=0x1) 22:19:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x4, 0x6000000000000000}, 0x28) 22:19:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe0000001", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe0000001", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe0000001", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x9, 0x6000000000000000}, 0x28) 22:19:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac1414e0e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14e00fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) 22:19:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14120fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac140c0fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac140c0fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14080fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14180fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) 22:19:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) 22:19:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14140fe0000001", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14060fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac140c0fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$packet(0x11, 0x2, 0x300) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac1414e0e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14080fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac140c0fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:06 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:06 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14180fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14020fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbace0140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac0f140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac10140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:07 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14020fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac14020fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac0e140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:08 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac18140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100144000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe10000400a633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004004633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:08 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004002633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100f04000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100f04000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004002633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100404000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1e0ff4000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1000e4000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1000a4000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b702000003000000bfa300ff000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000068b3e3797608d1bf87ff254626a14b4128a77d838ea57c6bb04f617a426c4c097910e56cd7417ae23a49fbe11397c2e17b50c5bb5bc39bfd79033e2cc0e0b8341e3e656cdfd01f1cc3dfd12d0f01c02a1585f8fe09ef4e3f3100f14ebd026373edbdce4ba33da018afbda18a21396a5653822568dbddfd2e6c979d6c1b08da8ad20005629f646bda04dba2134ee25332d98b3ae2d4d80cad6db586afb5105a582ff8d99f3b48814e22c91ef3c72a876a4ecdb5f8acbe6923263050c027b171ed04df4c50c0287f9aa5157c2dd3d043cc8cae06c13e5292cf40059a6aa37127637ebffb8a39ce1eae7691f91b91c2b3f284666cc6cdd279cf85b4f8d324d129b7fa2301219c2a308d3f4b892361c9534f0a975efad7eaff85c600e3ce7df29aefb412de4f012b625767995d6d08e0475a36561e"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100604000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1000a4000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1f0004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1f0004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe160004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe10a004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe10a004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe10a004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe1000e4000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fe0ffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088cae0ffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe102004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fe0ffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000e09e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000e0ff9e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000029e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000e0ff9e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000029e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000ffe09e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:12 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000609e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00014009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000209e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000149e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000000e9e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000000a9e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000000a9e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000f0009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000209e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000149e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) io_setup(0x1, &(0x7f00000001c0)) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00060009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:14 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0000e009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0000e009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0e0ff009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000f0009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:15 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00014009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0000a009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:15 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0ffe0009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0e0ff009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff000f0009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff06000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:16 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0f000009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00040009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff0ffe0009e40f088ca1fffffe100004000633377fbac14140fe9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:16 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bridge_slave_0\x00') 22:19:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) read$FUSE(r0, 0x0, 0xe00) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) setxattr$security_selinux(&(0x7f0000000180)='./file0/file1\x00', 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 22:19:17 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x4) r0 = open(0x0, 0x60142, 0x0) r1 = geteuid() setreuid(r1, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 22:19:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) [ 634.460731][T22270] fuse: Bad value for 'fd' 22:19:17 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) 22:19:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2842, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x8, 0x2, 0x12, r0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x12, 0xffffffffffffffff, 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) 22:19:17 executing program 2: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$netlink(r2, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{}], 0x1}, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000140)={0x27, 0x0, 0xe, 0xa, 0xa, 0x6, 0x0, 0x71, 0x1}) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaec}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000400)=""/173, 0xfffffffffffffd85, 0x2) perf_event_open(0x0, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f0000000580)=ANY=[]}], 0x1}, 0x0) ioctl$UI_SET_KEYBIT(r5, 0x40045565, 0x23e) socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00', 0x19, 0x4, 0x0, [0x20000b00, 0x0, 0x0, 0x20000d9c, 0x20000dcc], 0x0, 0x0}, 0x78) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') 22:19:17 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) [ 634.869309][T22293] overlayfs: failed to resolve './file1': -2 22:19:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") mq_notify(0xffffffffffffffff, 0x0) 22:19:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000080)) dup3(r0, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = eventfd2(0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 22:19:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:18 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:18 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:19 executing program 2: unshare(0x2040400) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) mq_notify(r0, 0x0) 22:19:19 executing program 0: perf_event_open(&(0x7f0000001040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0x0) 22:19:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2842, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x4012, r0, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x8, 0x2, 0x12, r0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x12, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x12, 0xffffffffffffffff, 0xffffffffffffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0x10) 22:19:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:19 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000001080)="c9093057b71dbf6b7da1a3f45baa541050af04bc07fbb887a19419301cff6fff93e37f9d9a460ebfc611c68275a7f47b982bb66868e6b8", 0x37}], 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x800000204000, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 22:19:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 22:19:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:19 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 22:19:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:20 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = getpid() syz_open_procfs(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r4 = dup2(r2, r2) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) r6 = getegid() msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)={{0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x1}) msgsnd(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="ad896004f17cfcdf0d65d9136993f913acde7fc4cb97cc7169a6f572b58c702a1b52cb08c9841cc373d04c38cfdc866bfdecc0d33c21"], 0x1, 0x0) msgrcv(r5, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r7, &(0x7f0000000140)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [], [0x0, 0x9000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setresuid(r8, 0x0, 0x0) lstat(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r11) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x800, r8, r9, r10, r11, 0x180, 0x4}, 0x8001, 0x8000, 0x9, 0x2, 0x101, 0x7, r12, r1}) r13 = dup(0xffffffffffffffff) sendmmsg(r13, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x20004844) r14 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r14, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, 0x0, 0x0) fdatasync(r14) 22:19:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r2 = dup2(r1, r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) socket$netlink(0x10, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 22:19:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 637.362522][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 637.368832][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 637.375020][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 637.380781][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:19:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000100000008000100", @ANYRES32=r1, @ANYBLOB="400002000000010024000900656e61626c0500000000000000000000000000000000fa2e009ad2174d4583e31b8ead00000000000000080003000600", @ANYRES32], 0x5c}}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 22:19:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0xfffffffffffff7f8, 0x0, 0x9, 0x0, 0xb6f2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 22:19:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:23 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = getpid() syz_open_procfs(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r4 = dup2(r2, r2) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) r6 = getegid() msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)={{0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x1}) msgsnd(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="ad896004f17cfcdf0d65d9136993f913acde7fc4cb97cc7169a6f572b58c702a1b52cb08c9841cc373d04c38cfdc866bfdecc0d33c21"], 0x1, 0x0) msgrcv(r5, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r7, &(0x7f0000000140)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [], [0x0, 0x9000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setresuid(r8, 0x0, 0x0) lstat(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r11) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x800, r8, r9, r10, r11, 0x180, 0x4}, 0x8001, 0x8000, 0x9, 0x2, 0x101, 0x7, r12, r1}) r13 = dup(0xffffffffffffffff) sendmmsg(r13, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x20004844) r14 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r14, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, 0x0, 0x0) fdatasync(r14) 22:19:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 640.028320][T22458] dns_resolver: Unsupported server list version (0) 22:19:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) [ 640.083074][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.088890][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 640.094733][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 640.100521][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:19:23 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = getpid() syz_open_procfs(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r4 = dup2(r2, r2) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) r6 = getegid() msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)={{0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x1}) msgsnd(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="ad896004f17cfcdf0d65d9136993f913acde7fc4cb97cc7169a6f572b58c702a1b52cb08c9841cc373d04c38cfdc866bfdecc0d33c21"], 0x1, 0x0) msgrcv(r5, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r7, &(0x7f0000000140)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [], [0x0, 0x9000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setresuid(r8, 0x0, 0x0) lstat(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r11) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x800, r8, r9, r10, r11, 0x180, 0x4}, 0x8001, 0x8000, 0x9, 0x2, 0x101, 0x7, r12, r1}) r13 = dup(0xffffffffffffffff) sendmmsg(r13, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x20004844) r14 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r14, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, 0x0, 0x0) fdatasync(r14) 22:19:23 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:23 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:29 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = getpid() syz_open_procfs(r1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000500)={'syz_tun\x00'}) r4 = dup2(r2, r2) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000001) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x7, 0x5}, 0x0, 0xc7, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000551000/0x3000)=nil, 0x3000) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f00006cdffb)="890704", 0x3) r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000040)={0x3}, 0x8, 0x0) r6 = getegid() msgctl$IPC_SET(r5, 0x1, &(0x7f0000f00f88)={{0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x1}) msgsnd(r5, &(0x7f00000005c0)=ANY=[@ANYBLOB="ad896004f17cfcdf0d65d9136993f913acde7fc4cb97cc7169a6f572b58c702a1b52cb08c9841cc373d04c38cfdc866bfdecc0d33c21"], 0x1, 0x0) msgrcv(r5, &(0x7f0000000080)={0x0, ""/35}, 0x2b, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$uinput_user_dev(r7, &(0x7f0000000140)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0e], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [], [0x0, 0x9000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81]}, 0x45c) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x0, 0xfffffffe}) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) setresuid(r8, 0x0, 0x0) lstat(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r11) ioctl$sock_SIOCGPGRP(r4, 0x8904, &(0x7f00000002c0)=0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x800, r8, r9, r10, r11, 0x180, 0x4}, 0x8001, 0x8000, 0x9, 0x2, 0x101, 0x7, r12, r1}) r13 = dup(0xffffffffffffffff) sendmmsg(r13, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0}}], 0x227, 0x20004844) r14 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$eventfd(r14, &(0x7f0000000080), 0xfffffe5e) modify_ldt$read(0x0, 0x0, 0x0) fdatasync(r14) 22:19:29 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:29 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:29 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='veth1_to_hsr\x00', 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$unix(r0, &(0x7f0000000900)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, 0x0}, 0x0) 22:19:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:30 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 647.086069][T22526] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 22:19:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:39 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @random="6166ff8b7569"}, 0x0, {0x2, 0x0, @remote}, 'sit0\x00'}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @local}, 0x2, {}, 'bond0\x00'}) 22:19:39 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:39 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @random="6166ff8b7569"}, 0x0, {0x2, 0x0, @remote}, 'sit0\x00'}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @local}, 0x2, {}, 'bond0\x00'}) 22:19:39 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 22:19:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:46 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:46 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:46 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:46 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:19:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000}, 0x28) 22:19:57 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200}) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:19:57 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @local}, 0x0, {}, 'bond0\x00'}) socket(0x0, 0x0, 0x0) 22:19:57 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) poll(0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @empty}, {0x4000030000000304, @local}, 0x0, {}, 'bond0\x00'}) socket(0x0, 0x0, 0x0) 22:19:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0xa4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:19:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:19:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:19:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:19:57 executing program 4: socket$inet_sctp(0x2, 0x0, 0x84) syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@barrier='barrier'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}]}) lstat(0x0, 0x0) [ 674.615517][T22676] hfsplus: unable to parse mount options 22:20:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:03 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:20:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:03 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000880)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2001002, 0x0) umount2(&(0x7f00000000c0)='./file0/file0\x00', 0x6) 22:20:03 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) recvfrom(r1, 0x0, 0x0, 0x40012500, 0x0, 0x0) 22:20:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:03 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="02010109080000000000000000000000030006001000000002000000e00000090000000000000000030005007217440502000000e000000100000000000000000d2c300778a6d0c82a2f8437e891c5e8f43479784498ddc9434cd32acb9814007559b72a3ac49eba42cb3938cc21297656f6761499ee73bd385dd8fc6248c019d86bf187dcaedfd016c96410890ce0f1b578e10dfa622b09fbc79e86edb3763adb945fd89a1b530c8b1b24110cc6b3fef30d956a52efbaa454deed2a01672213c496071ed4c59479024323011806fb8a3998b6265efec09cb3c268b386b13dd323dfed21a8473f59fcb236a39d53950ae4ecd1015dd5987f842a3083b9f87d9620e13c8c70eba465b4de0100e4e84716b590032c410e0c71447aeff13e5efd2b472db6776020906dcaa809c75d92ce543dfc85532f63bf654192f447abcaaf6b2b9f9e11e4dfbdf8c0b7e12bd0120cbfcc699d604f93aa2ccd5ef594d61e64befccc1167d89ebe6e3a5c02fdb815e3829205964495c7ad284e892b01d90d7f254c6da428d3f037db5e7165adb2ce871cac402c7f859a789c273944c1d4a3f656d9473a26926aa54ab1456723195a046320967a6bb2c1d23d853d"], 0x40}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x2, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 22:20:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:11 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:11 executing program 0: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) recvfrom(r1, 0x0, 0x0, 0x40012500, 0x0, 0x0) 22:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) preadv(r0, &(0x7f00000008c0)=[{&(0x7f0000000580)=""/94, 0x5e}], 0x1, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="10000000daffffff0200000000000000117423db6984de1a5e99e66590b97b27adec981d9aafe2c3813babc482b2dfd87b0ce51f329ac96d"], 0x10) 22:20:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='yeah\x00', 0x5) sendto$inet(r0, 0x0, 0xfffffffffffffcc0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x10, 0x3, 0x4) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 22:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:19 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:19 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) accept4(0xffffffffffffffff, 0x0, 0x0, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:19 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x11, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffff", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:27 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:27 executing program 0: 22:20:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='oom_adj\x00') io_setup(0x3, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r0, 0x0}]) 22:20:27 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) write(r0, &(0x7f0000000000)="16", 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 22:20:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:27 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:27 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r1, 0xffffffffffffffff, 0x3) 22:20:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1a, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fb", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:36 executing program 0: r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xdd4ad65}]) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 22:20:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:36 executing program 4: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/102) 22:20:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:36 executing program 4: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB='filter\x00'/27], &(0x7f0000000000)=0x1) r1 = dup(0xffffffffffffffff) bind$inet6(r1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) ftruncate(0xffffffffffffffff, 0x0) 22:20:36 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d362f66697f38312c75707065726469723f2e2f66696c65302c00041cb63c8f5180547b45c54484f473675f59a1d62756906b681ca482c46a4d04bc1cdb726c668f5b6bda6f344d43a17def9cee6d0813f8931e0d2e67a62651438e5d35fa82651b8575bfcfd02a3f00907faa5bc8aa6a2e07f765c05619f14b341bba77fbdf7fbd52f79cbb36bd28abe728368ddd36d43599095d6c9965cdcd6fea"]) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40040, 0x0) pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 22:20:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) [ 714.028079][T22912] overlayfs: filesystem on './file0' not supported as upperdir 22:20:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:42 executing program 4: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB='filter\x00'/27], &(0x7f0000000000)=0x1) r1 = dup(0xffffffffffffffff) bind$inet6(r1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) ftruncate(0xffffffffffffffff, 0x0) 22:20:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)) sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:42 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d362f66697f38312c75707065726469723f2e2f66696c65302c00041cb63c8f5180547b45c54484f473675f59a1d62756906b681ca482c46a4d04bc1cdb726c668f5b6bda6f344d43a17def9cee6d0813f8931e0d2e67a62651438e5d35fa82651b8575bfcfd02a3f00907faa5bc8aa6a2e07f765c05619f14b341bba77fbdf7fbd52f79cbb36bd28abe728368ddd36d43599095d6c9965cdcd6fea"]) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40040, 0x0) pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 22:20:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 720.022347][T22933] overlayfs: conflicting lowerdir path 22:20:43 executing program 4: bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB='filter\x00'/27], &(0x7f0000000000)=0x1) r1 = dup(0xffffffffffffffff) bind$inet6(r1, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x800, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) bind$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) ftruncate(0xffffffffffffffff, 0x0) 22:20:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:43 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d362f66697f38312c75707065726469723f2e2f66696c65302c00041cb63c8f5180547b45c54484f473675f59a1d62756906b681ca482c46a4d04bc1cdb726c668f5b6bda6f344d43a17def9cee6d0813f8931e0d2e67a62651438e5d35fa82651b8575bfcfd02a3f00907faa5bc8aa6a2e07f765c05619f14b341bba77fbdf7fbd52f79cbb36bd28abe728368ddd36d43599095d6c9965cdcd6fea"]) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40040, 0x0) pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 22:20:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a3", 0x0, 0x100, 0x6000000000000000}, 0x40) [ 720.780753][T22972] overlayfs: conflicting lowerdir path 22:20:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1d") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:48 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) write(r0, &(0x7f0000000000)="16", 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 22:20:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d362f66697f38312c75707065726469723f2e2f66696c65302c00041cb63c8f5180547b45c54484f473675f59a1d62756906b681ca482c46a4d04bc1cdb726c668f5b6bda6f344d43a17def9cee6d0813f8931e0d2e67a62651438e5d35fa82651b8575bfcfd02a3f00907faa5bc8aa6a2e07f765c05619f14b341bba77fbdf7fbd52f79cbb36bd28abe728368ddd36d43599095d6c9965cdcd6fea"]) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/120, 0x78}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x40040, 0x0) pipe(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 22:20:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:48 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:48 executing program 4: r0 = getpid() r1 = getpgrp(0xffffffffffffffff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000200)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r3, &(0x7f0000000040)) 22:20:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x21, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33f", 0x0, 0x100, 0x6000000000000000}, 0x40) 22:20:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:20:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:20:57 executing program 0: timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) msgctl$IPC_SET(0x0, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03"], 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 22:20:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f00000003c0)) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:20:57 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000220000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b72eb83ec5a3c87bb07eb78c27b0e1773f04a22ba8cedf8510e63fb112cf6956e09d1938013c217e0f6ae30b"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x80000, 0x10, 0x0, &(0x7f0000000140)="a673f3ce05f1a282eeab050000030000810ae63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3ff, 0x0, 0x0, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) 22:20:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:20:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x228, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x1) rt_sigpending(0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r3 = socket(0x10, 0x80002, 0x0) sendfile(r3, r2, 0x0, 0xf0d) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r5 = getpgid(r4) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x88, 0xf0, 0x1, 0x1f, 0x0, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa, 0x0, @perf_config_ext={0x3ff, 0x2}, 0xc001, 0x7, 0x53c, 0x0, 0x2, 0x100, 0xb8d}, r5, 0x4, r0, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') semget(0x1, 0x0, 0x100) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 22:20:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:20:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:20:57 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:20:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x0, 0x6000000000000000}, 0x40) 22:21:06 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) socket$inet(0x2, 0x5, 0x7) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:06 executing program 0: 22:21:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:06 executing program 4: 22:21:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:21:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:06 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x888840, 0x62) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000000), 0x4) r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) write(r0, &(0x7f0000000000)="16", 0x1) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) creat(0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001, 0x13, r2, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) creat(0x0, 0x0) r3 = creat(0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x44800) 22:21:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") unshare(0x2040400) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:21:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:06 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b10") sendto$inet(r0, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:21:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000440)='de\xe7 ', 0x203) write(r0, &(0x7f0000000000)="16", 0x1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) 22:21:15 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, 0x0}, 0x40) 22:21:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:21:15 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6c6f7765726469723d2e2f6275732c776f726b6469723d362f66697f38312c75707065"]) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) 22:21:15 executing program 4: 22:21:15 executing program 4: 22:21:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) [ 752.270608][T23123] overlayfs: failed to resolve './file1': -2 22:21:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:15 executing program 0: 22:21:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:22 executing program 4: 22:21:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(0xffffffffffffffff, &(0x7f0000000280)="d1", 0x1, 0x0, 0x0, 0x0) 22:21:22 executing program 0: 22:21:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:22 executing program 4: 22:21:22 executing program 0: 22:21:22 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000100)="b9010efffff00000009e40f088ca1fffffe100004000633377fbac141410e9a33fa1", 0x0, 0x100, 0x6000000000000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 22:21:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:21:22 executing program 5: 22:21:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:21:28 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:28 executing program 4: 22:21:28 executing program 0: 22:21:28 executing program 1: 22:21:28 executing program 5: 22:21:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:21:29 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x1}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 22:21:29 executing program 5: r0 = creat(&(0x7f00000004c0)='./bus\x00', 0x0) io_submit(0x0, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x40000000000000, 0x0, 0x3, 0x0, 0x0, r0, &(0x7f0000000000), 0x10000}]) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB='t'], 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:21:29 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000040)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r0, r1) 22:21:29 executing program 0: bind$packet(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 22:21:29 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) 22:21:29 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x1}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 22:21:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:36 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000580)='hfsplus\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@barrier='barrier'}]}) 22:21:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) 22:21:36 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) 22:21:36 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b]P\x0e\x06C\xc3MY\x1d\x9b9g\xc3\x16\xb1\x9b=cy\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b\x0fJ\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 22:21:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'gup_id\x00'}}) [ 773.096631][T23232] hfsplus: unable to find HFS+ superblock [ 773.128632][T23231] fuse: Bad value for 'fd' 22:21:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet(r0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) [ 773.156544][ T26] audit: type=1804 audit(1573251696.255:48): pid=23236 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2328 res=1 [ 773.195125][T23232] hfsplus: unable to find HFS+ superblock [ 773.227398][T23240] fuse: Bad value for 'fd' 22:21:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) 22:21:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x228, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x8}, {}, 0x40000000}, {{@in=@remote, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) r2 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) getpgid(r2) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd28c231e55890969}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)={0xe4, r3, 0x400, 0x0, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x53}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xde5}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x4}}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x53f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xf}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x1a}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x29c2608b1d504a24}, 0x20000010) semget(0x1, 0x0, 0x100) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x400000000000058, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 22:21:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x40, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(0xffffffffffffffff, 0xc0106403, 0x0) 22:21:36 executing program 5: clone(0x4004700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$packet_int(r1, 0x107, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_int(r0, 0x1, 0xf, 0x0, &(0x7f00000000c0)) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r5, 0x80006) sendfile(r0, r5, 0x0, 0x8000fffffffe) symlinkat(0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000002ff9), 0x40000004, 0x0) 22:21:36 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x0, 0x1ff}}, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{}]}) [ 773.737857][T23269] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 774.322578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.328533][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.642545][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 774.648346][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 774.654118][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 774.659884][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 775.122562][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 775.128399][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 775.292553][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 775.298328][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 779.442586][ C0] net_ratelimit: 22 callbacks suppressed [ 779.442595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.454809][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 779.461295][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 779.467305][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 780.562543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 780.568663][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 780.892551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 780.899434][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 780.905383][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 780.911354][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:21:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0xfffffffffffffffe}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x33}, 0x0, @in=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 22:21:44 executing program 0: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_gettime(r0, &(0x7f00000000c0)) 22:21:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x16, &(0x7f00006ed000), &(0x7f0000000140)=0x4) 22:21:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'\b\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6934) r0 = add_key(0x0, &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[], 0x0, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x800000003, 0xff) syz_genetlink_get_family_id$devlink(&(0x7f0000000340)='devlink\x00') connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = dup(r2) r4 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000fffffffe) bind$packet(r3, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x40000}, [@IFLA_GROUP={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x48811}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:21:44 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 22:21:44 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff}}, 0xa) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{}]}) 22:21:44 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:44 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 22:21:45 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) io_setup(0x8, 0x0) sysfs$3(0x3) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) write$UHID_INPUT2(r3, &(0x7f0000001bc0)=ANY=[], 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)=',\x10\xec]$R\xaf\xf18\'\x99\xfc\xa1\xef\xff3\xd5\x9f\x9d\xff;L\xde<\xb8\xe5\xc4\x8c\xba2A\xaa6\x1d\x97,\xa7t3\x14\x1f\x94\x1b\xebzGY\x83\xa8\x0e\xc3Q\xb81\xf4\xea\xa2D\xd3\xf4\'\xea29\x80\xd3\xd7\xc2L\x8a\xe52W$)\x0e,\xf1P\xd4\xb1|z\xe5R\xb5.\xe4\xa7\xad\xd1\xbfRB\xeduL\xa9k') r4 = gettid() tkill(r4, 0x3c) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x2100) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffe, 0x0, @perf_config_ext={0x80000000, 0x2}, 0x0, 0x3, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r7, &(0x7f0000000100)=""/79, 0x1000001b3) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') 22:21:45 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 22:21:45 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{}]}) [ 782.328344][T23326] devpts: called with bogus options [ 782.488710][ T26] audit: type=1800 audit(1573251705.585:49): pid=23285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16808 res=0 [ 782.620267][T23326] devpts: called with bogus options [ 783.183431][T23301] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.191026][T23301] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.722591][ C0] net_ratelimit: 18 callbacks suppressed [ 784.722599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.736257][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.042621][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 785.048845][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 785.054656][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 785.060545][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 785.323936][ T8138] device bridge_slave_1 left promiscuous mode [ 785.330575][ T8138] bridge0: port 2(bridge_slave_1) entered disabled state [ 785.383246][ T8138] device bridge_slave_0 left promiscuous mode [ 785.389849][ T8138] bridge0: port 1(bridge_slave_0) entered disabled state [ 785.562844][ T8138] device hsr_slave_0 left promiscuous mode [ 785.602606][ T8138] device hsr_slave_1 left promiscuous mode [ 785.650396][ T8138] team0 (unregistering): Port device team_slave_1 removed [ 785.661586][ T8138] team0 (unregistering): Port device team_slave_0 removed [ 785.672644][ T8138] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 785.682575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.688360][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.694156][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.699914][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.726589][ T8138] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 785.795642][ T8138] bond0 (unregistering): Released all slaves 22:21:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:49 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:49 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) 22:21:49 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:49 executing program 3: r0 = timerfd_create(0x10000000000008, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timerfd_gettime(r0, &(0x7f00000000c0)) 22:21:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000001240)='/dev/vcs#\x00', 0x0, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'.\x00'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) 22:21:50 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:50 executing program 3: 22:21:50 executing program 3: 22:21:50 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:50 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:50 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 789.492113][T23383] IPVS: ftp: loaded support on port[0] = 21 [ 789.545229][T23383] chnl_net:caif_netlink_parms(): no params data found [ 789.571820][T23383] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.579258][T23383] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.587231][T23383] device bridge_slave_0 entered promiscuous mode [ 789.594857][T23383] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.602001][T23383] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.610031][T23383] device bridge_slave_1 entered promiscuous mode [ 789.627964][T23383] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 789.638608][T23383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 789.657910][T23383] team0: Port device team_slave_0 added [ 789.664554][T23383] team0: Port device team_slave_1 added [ 789.735368][T23383] device hsr_slave_0 entered promiscuous mode [ 789.823040][T23383] device hsr_slave_1 entered promiscuous mode [ 789.842549][ C0] net_ratelimit: 16 callbacks suppressed [ 789.842562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 789.854240][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 789.860140][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 789.865957][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 789.882582][T23383] debugfs: Directory 'hsr0' with parent '/' already present! [ 789.897618][T23383] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.904680][T23383] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.911942][T23383] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.918998][T23383] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.950637][T23383] 8021q: adding VLAN 0 to HW filter on device bond0 [ 789.962252][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 789.970641][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.989226][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.998518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 790.011834][T23383] 8021q: adding VLAN 0 to HW filter on device team0 [ 790.022127][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 790.030707][ T8137] bridge0: port 1(bridge_slave_0) entered blocking state [ 790.037828][ T8137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 790.049171][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 790.057613][ T8244] bridge0: port 2(bridge_slave_1) entered blocking state [ 790.064741][ T8244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 790.084689][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 790.093799][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 790.103334][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 790.116679][T23383] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 790.127505][T23383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 790.139744][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 790.149168][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 790.157964][ T8137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 790.172894][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 790.180332][ T8244] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 790.191627][T23383] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 790.252563][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.258348][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 790.292497][T23392] dns_resolver: Unsupported server list version (0) [ 790.301593][T23393] dns_resolver: Unsupported server list version (0) [ 790.372520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.378285][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 790.492528][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 790.498336][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 795.122527][ C0] net_ratelimit: 26 callbacks suppressed [ 795.122539][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.134071][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:21:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:21:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:58 executing program 3: 22:21:58 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) setreuid(0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:21:58 executing program 0: 22:21:58 executing program 1: 22:21:58 executing program 3: 22:21:58 executing program 0: [ 795.442758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 795.448861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 795.455199][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 795.461385][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:21:58 executing program 1: 22:21:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:21:58 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 22:21:58 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f0000000440)=""/17, 0x11) [ 796.092536][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.098318][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 796.104116][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 796.109885][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.242544][ C0] net_ratelimit: 20 callbacks suppressed [ 800.248255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.254036][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.259899][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 800.265731][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 800.962534][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 800.968351][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 801.362676][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 801.368583][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 801.682505][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 801.688377][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000240)={'security\x00'}, &(0x7f00000002c0)=0x54) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:07 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f0000000400)) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x14) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) r5 = getpgrp(r4) ptrace$setregset(0x4205, r5, 0x201, &(0x7f0000000240)={&(0x7f0000000180)="4384456263f01d37f3202cdc72e8896e6531a69d4ad50276998be0974352aa5966f03fa303288af1d8ddf940e23c881fd04b556aa59f0f10a6d07acd74e35d2a1fbec507e7fe5f502b0d3412051a7cac3adf2441b32ccc9e352b9e00de049e02dd0894cba5cccad5ade7477ca94ff5ee64bcfda99c2e918cfec163c94c922644d033b4e538c6982abdc7a328d3165be37452ed19c76e", 0x96}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000180)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(r7, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0xb) r8 = socket$inet6(0xa, 0x8000a, 0x0) clock_settime(0x1, &(0x7f0000000140)={0x77359400}) r9 = creat(0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r9, 0x6612) ioctl$GIO_SCRNMAP(r9, 0x4b40, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) read(r8, 0x0, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) connect(r6, &(0x7f0000000240)=@isdn={0x22, 0x0, 0x0, 0x3, 0x3}, 0x80) 22:22:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:07 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:07 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:22:07 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:22:07 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:22:08 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:08 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:08 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) [ 805.522760][ C0] net_ratelimit: 20 callbacks suppressed [ 805.522787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 805.534590][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 805.842559][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 805.848329][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 805.854112][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 805.859857][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 806.482617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.488541][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 806.494380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 806.500144][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 810.642530][ C0] net_ratelimit: 20 callbacks suppressed [ 810.642544][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 810.654075][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 810.659840][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 810.665612][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:22:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:22:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) 22:22:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) r0 = geteuid() setreuid(r0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 811.362573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 811.368379][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:14 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:14 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 811.762837][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 811.768956][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 812.082552][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 812.088403][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 815.922522][ C0] net_ratelimit: 20 callbacks suppressed [ 815.922532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 815.933959][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.242567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 816.248467][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 816.254441][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 816.260240][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 816.882547][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.888321][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 816.894119][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 816.899925][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:22:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:22 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:23 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) open(0x0, 0x60142, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 821.042548][ C0] net_ratelimit: 20 callbacks suppressed [ 821.048270][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.053992][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 821.059737][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 821.065462][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 821.762572][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 821.768399][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 822.162540][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 822.168343][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 822.483011][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 822.488841][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:27 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:27 executing program 4: 22:22:27 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:27 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:27 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:28 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:28 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a169c773cfe87b1071") syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000900)=ANY=[@ANYBLOB='attr2,s']) 22:22:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) syz_genetlink_get_family_id$ipvs(0x0) 22:22:28 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 825.106168][T23612] XFS (loop4): unknown mount option [s]. 22:22:28 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 825.186769][T23621] XFS (loop4): unknown mount option [s]. [ 826.322857][ C0] net_ratelimit: 20 callbacks suppressed [ 826.322870][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 826.335561][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 826.642620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 826.648517][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 826.654403][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 826.660192][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 827.282543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 827.288338][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 827.294113][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 827.299826][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 831.442546][ C0] net_ratelimit: 20 callbacks suppressed [ 831.442554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.454004][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 831.459770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 831.465785][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 832.172524][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 832.178405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 832.562556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 832.568389][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 832.882558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 832.888431][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8013, r0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r1 = socket(0x10, 0x80002, 0x0) sendfile(r1, r0, 0x0, 0xf0d) syz_genetlink_get_family_id$ipvs(0x0) 22:22:37 executing program 4: r0 = socket(0x11, 0x3, 0xfffffffffffffc01) recvfrom$unix(r0, &(0x7f0000000240), 0x0, 0x40012003, 0x0, 0x713) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @multicast1}, &(0x7f0000000340)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r4}, 0x14) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r5 = socket(0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f00000008c0), 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_timeval(r6, 0x1, 0x15, &(0x7f0000000000), 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r7, 0x8954, &(0x7f000000b680)={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, {0x6, @local}, 0x62, {0x2, 0x4e23, @loopback}, 'ip6tnl0\x00'}) r8 = socket$inet6(0xa, 0x800, 0xd5b) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) getgid() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000580)=0x25f) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@local, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) getgid() getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@dev, @in=@empty}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000000c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@multicast1, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getgid() ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f00000011c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001200)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000001300)=0xe8) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000001340), &(0x7f0000001380)=0xc) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003a40)) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000003a80)={{{@in=@remote, @in=@remote}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000003b80)=0xe8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003bc0), &(0x7f0000003c00)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003c40), &(0x7f0000003c80)=0xc) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xff21) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000003e80)) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000004040)={{{@in=@local, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, 0x0) getgid() gettid() getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000004140)={{{@in=@broadcast, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000004240)=0xe8) getgid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000004280)={{{@in=@multicast2, @in6=@initdev}}, {{}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0x484) getgid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000004400)={{{@in6=@mcast1, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004500)=0x115) getgid() ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000280)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004900), &(0x7f0000004940)=0xc) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000004980), &(0x7f00000049c0)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000540)=0xc) r9 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r9, 0x29, 0x2f, &(0x7f00000005c0)={0x800, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x8, @local}}}, 0x108) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004a80)={{{@in6=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0x469) getgid() 22:22:37 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r0, 0xc020662a, &(0x7f00000001c0)={0x0, 0x3, 0x3}) 22:22:37 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x1ff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 22:22:37 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:37 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 836.722529][ C0] net_ratelimit: 20 callbacks suppressed [ 836.722538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 836.733974][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.042612][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 837.048465][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 837.054690][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 837.060612][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 837.682597][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.688670][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 837.694482][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 837.700247][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 841.842551][ C0] net_ratelimit: 20 callbacks suppressed [ 841.848532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 841.854321][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 841.860107][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 841.865854][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 842.562526][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 842.568354][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 842.962974][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 842.968768][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 843.282546][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 843.288461][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:46 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:46 executing program 4: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timerfd_gettime(r0, &(0x7f00000000c0)) 22:22:46 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:46 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="240000002a00070200"/20, @ANYRES32, @ANYBLOB="ec000000de00000000000000"], 0x24}}, 0x0) 22:22:46 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:46 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, &(0x7f0000000100)=0x4, 0xe0) 22:22:46 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) listxattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)=""/4, 0x4) 22:22:47 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:47 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 847.122584][ C0] net_ratelimit: 20 callbacks suppressed [ 847.122598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 847.134030][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 847.442722][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 847.448669][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 847.454496][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 847.460258][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 848.082804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.088631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 848.094394][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 848.100255][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 852.242565][ C0] net_ratelimit: 20 callbacks suppressed [ 852.242579][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 852.254214][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 852.259996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 852.265782][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 852.962551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 852.968539][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 853.362602][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 853.368395][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 853.682536][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 853.688393][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:22:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:22:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:22:58 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 0: add_key(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) creat(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syz_tun\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_MASTER={0x8}]}, 0x28}}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:22:58 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000080)=0x2, 0x4) r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x80080) sendfile(r2, r3, 0x0, 0x2008000fffffffe) 22:22:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:22:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000280)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:22:58 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 855.376532][T23792] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 857.522516][ C0] net_ratelimit: 21 callbacks suppressed [ 857.522524][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 857.534009][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 857.842588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 857.848369][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 857.854150][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 857.859893][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 858.482590][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 858.488419][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 858.494230][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 858.500130][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 862.642499][ C0] net_ratelimit: 20 callbacks suppressed [ 862.642508][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 862.653993][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 862.659800][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 862.665556][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 863.362562][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 863.368394][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 863.762512][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 863.768285][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 864.092509][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 864.098339][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:23:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xc50ea21d) syz_genetlink_get_family_id$tipc2(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000480)=0x4, 0x73) getsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000000)='g', 0x1}], 0x1) 22:23:07 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:23:07 executing program 0: 22:23:07 executing program 4: 22:23:07 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:23:07 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) geteuid() rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:23:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) 22:23:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) linkat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 22:23:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) 22:23:07 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, 0x0, 0x1081, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) 22:23:08 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') 22:23:08 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf7, 0x8000}, 0x51}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') [ 867.922522][ C0] net_ratelimit: 20 callbacks suppressed [ 867.922531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 867.933948][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 868.242541][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 868.248306][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 868.254099][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 868.259846][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 868.562638][ C0] ================================================================== [ 868.570900][ C0] BUG: KCSAN: data-race in inet_unhash / inet_unhash [ 868.577577][ C0] [ 868.579891][ C0] write to 0xffff8880a69a0170 of 8 bytes by interrupt on cpu 1: [ 868.587503][ C0] inet_unhash+0x38f/0x4a0 [ 868.591899][ C0] tcp_set_state+0xfa/0x3e0 [ 868.596384][ C0] tcp_done+0x93/0x1e0 [ 868.600451][ C0] tcp_write_err+0x7e/0xc0 [ 868.604852][ C0] tcp_retransmit_timer+0x9b8/0x16d0 [ 868.610120][ C0] tcp_write_timer_handler+0x42d/0x510 [ 868.615673][ C0] tcp_write_timer+0xd1/0xf0 [ 868.620258][ C0] call_timer_fn+0x5f/0x2f0 [ 868.624748][ C0] run_timer_softirq+0xc0c/0xcd0 [ 868.629670][ C0] __do_softirq+0x115/0x33f [ 868.634170][ C0] irq_exit+0xbb/0xe0 [ 868.638149][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 868.643592][ C0] apic_timer_interrupt+0xf/0x20 [ 868.648512][ C0] native_safe_halt+0xe/0x10 [ 868.653090][ C0] arch_cpu_idle+0x1f/0x30 [ 868.657497][ C0] default_idle_call+0x1e/0x40 [ 868.662245][ C0] do_idle+0x1af/0x280 [ 868.666299][ C0] cpu_startup_entry+0x1b/0x20 [ 868.671046][ C0] start_secondary+0x208/0x260 [ 868.675790][ C0] secondary_startup_64+0xa4/0xb0 [ 868.680785][ C0] [ 868.683096][ C0] read to 0xffff8880a69a0170 of 8 bytes by interrupt on cpu 0: [ 868.690618][ C0] inet_unhash+0x3d/0x4a0 [ 868.694928][ C0] tcp_set_state+0xfa/0x3e0 [ 868.699414][ C0] tcp_done+0x93/0x1e0 [ 868.703494][ C0] tcp_write_err+0x7e/0xc0 [ 868.707909][ C0] tcp_retransmit_timer+0x9b8/0x16d0 [ 868.713194][ C0] tcp_write_timer_handler+0x42d/0x510 [ 868.718642][ C0] tcp_write_timer+0xd1/0xf0 [ 868.723220][ C0] call_timer_fn+0x5f/0x2f0 [ 868.727720][ C0] run_timer_softirq+0xc0c/0xcd0 [ 868.732640][ C0] __do_softirq+0x115/0x33f [ 868.737126][ C0] irq_exit+0xbb/0xe0 [ 868.741114][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 868.746554][ C0] apic_timer_interrupt+0xf/0x20 [ 868.751476][ C0] native_safe_halt+0xe/0x10 [ 868.756051][ C0] arch_cpu_idle+0x1f/0x30 [ 868.760448][ C0] default_idle_call+0x1e/0x40 [ 868.765211][ C0] do_idle+0x1af/0x280 [ 868.769272][ C0] cpu_startup_entry+0x1b/0x20 [ 868.774027][ C0] rest_init+0xec/0xf6 [ 868.778082][ C0] arch_call_rest_init+0x17/0x37 [ 868.783002][ C0] start_kernel+0x838/0x85e [ 868.787487][ C0] x86_64_start_reservations+0x29/0x2b [ 868.792938][ C0] x86_64_start_kernel+0x72/0x76 [ 868.797857][ C0] secondary_startup_64+0xa4/0xb0 [ 868.802855][ C0] [ 868.805170][ C0] Reported by Kernel Concurrency Sanitizer on: [ 868.811321][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.0-rc6+ #0 [ 868.818405][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.828444][ C0] ================================================================== [ 868.836485][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 868.843055][ C0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.4.0-rc6+ #0 [ 868.850138][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 868.860181][ C0] Call Trace: [ 868.863447][ C0] [ 868.866289][ C0] dump_stack+0xf5/0x159 [ 868.870515][ C0] panic+0x210/0x640 [ 868.874400][ C0] ? vprintk_func+0x8d/0x140 [ 868.878996][ C0] kcsan_report.cold+0xc/0xe [ 868.883571][ C0] kcsan_setup_watchpoint+0x3fe/0x410 [ 868.888926][ C0] __tsan_read8+0x145/0x1f0 [ 868.893427][ C0] inet_unhash+0x3d/0x4a0 [ 868.897751][ C0] tcp_set_state+0xfa/0x3e0 [ 868.902246][ C0] ? jiffies_to_msecs+0x1b/0x30 [ 868.907081][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 868.912960][ C0] tcp_done+0x93/0x1e0 [ 868.917023][ C0] tcp_write_err+0x7e/0xc0 [ 868.921424][ C0] tcp_retransmit_timer+0x9b8/0x16d0 [ 868.926708][ C0] tcp_write_timer_handler+0x42d/0x510 [ 868.932152][ C0] tcp_write_timer+0xd1/0xf0 [ 868.936725][ C0] ? tcp_write_timer_handler+0x510/0x510 [ 868.942344][ C0] call_timer_fn+0x5f/0x2f0 [ 868.946836][ C0] ? tcp_write_timer_handler+0x510/0x510 [ 868.952460][ C0] ? tcp_write_timer_handler+0x510/0x510 [ 868.958078][ C0] run_timer_softirq+0xc0c/0xcd0 [ 868.963015][ C0] ? sched_clock_cpu+0x15/0xe0 [ 868.967774][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 868.974032][ C0] __do_softirq+0x115/0x33f [ 868.978534][ C0] irq_exit+0xbb/0xe0 [ 868.982506][ C0] smp_apic_timer_interrupt+0xe6/0x280 [ 868.987972][ C0] ? smp_reschedule_interrupt+0x71/0x1d0 [ 868.993600][ C0] apic_timer_interrupt+0xf/0x20 [ 868.998519][ C0] [ 869.001453][ C0] RIP: 0010:native_safe_halt+0xe/0x10 [ 869.006834][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 e9 07 00 00 00 0f 00 2d 6c 00 4c 00 f4 c3 66 90 e9 07 00 00 00 0f 00 2d 5c 00 4c 00 fb f4 90 55 48 89 e5 41 55 41 54 53 e8 32 36 a4 fc e8 4d 82 b8 fd 0f [ 869.026423][ C0] RSP: 0018:ffffffff85a03de0 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 869.034820][ C0] RAX: 00000000000001d1 RBX: ffffffff85a2b780 RCX: 0000ffffffffffff [ 869.042776][ C0] RDX: 0000000000000000 RSI: 0000000000000016 RDI: ffffffff85a56378 [ 869.050750][ C0] RBP: ffffffff85a03e18 R08: 0000ffff85a56378 R09: 00000000aaaaaaab [ 869.058724][ C0] R10: 0000ffff85a5637f R11: 0000000000000000 R12: 0000000000000000 [ 869.066719][ C0] R13: ffffffff85a2b780 R14: 0000000000000000 R15: 0000000000000000 [ 869.074718][ C0] ? default_idle+0x50/0x230 [ 869.079495][ C0] arch_cpu_idle+0x1f/0x30 [ 869.083913][ C0] default_idle_call+0x1e/0x40 [ 869.088673][ C0] do_idle+0x1af/0x280 [ 869.092800][ C0] cpu_startup_entry+0x1b/0x20 [ 869.097610][ C0] rest_init+0xec/0xf6 [ 869.101688][ C0] ? trace_event_define_fields_vector_free_moved+0xce/0xce [ 869.108884][ C0] arch_call_rest_init+0x17/0x37 [ 869.113833][ C0] start_kernel+0x838/0x85e [ 869.118601][ C0] x86_64_start_reservations+0x29/0x2b [ 869.124172][ C0] x86_64_start_kernel+0x72/0x76 [ 869.129107][ C0] secondary_startup_64+0xa4/0xb0 [ 869.135816][ C0] Kernel Offset: disabled [ 869.140164][ C0] Rebooting in 86400 seconds..